First published: Mon Jul 23 2018(Updated: )
The Apache TomEE console (tomee-webapp) has a XSS vulnerability which could allow javascript to be executed if the user is given a malicious URL. This web application is typically used to add TomEE features to a Tomcat installation. The TomEE bundles do not ship with this application included. This issue can be mitigated by removing the application after TomEE is setup (if using the application to install TomEE), using one of the provided pre-configured bundles, or by upgrading to TomEE 7.0.5. This issue is resolve in this commit: b8bbf50c23ce97dd64f3a5d77f78f84e47579863.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache TomEE | <7.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-8031 is a vulnerability in the Apache TomEE console (tomee-webapp) that allows for cross-site scripting (XSS) attacks.
The severity of CVE-2018-8031 is classified as medium with a CVSS score of 6.1.
CVE-2018-8031 allows an attacker to execute malicious JavaScript by tricking the user into accessing a specially crafted URL.
Apache TomEE versions up to (but excluding) 7.0.5 are affected by CVE-2018-8031.
Yes, upgrading to a version of Apache TomEE that is later than 7.0.5 will fix the vulnerability.