First published: Tue Aug 06 2019(Updated: )
Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.<br>Security Fix(es):<br><li> tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources (CVE-2018-1304)</li> <li> tomcat: Late application of security constraints can lead to resource exposure for unauthorised users (CVE-2018-1305)</li> <li> tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins (CVE-2018-8014)</li> <li> tomcat: Host name verification missing in WebSocket client (CVE-2018-8034)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Additional Changes:<br>For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.7 Release Notes linked from the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/tomcat | <7.0.76-9.el7 | 7.0.76-9.el7 |
redhat/tomcat | <7.0.76-9.el7 | 7.0.76-9.el7 |
redhat/tomcat-admin-webapps | <7.0.76-9.el7 | 7.0.76-9.el7 |
redhat/tomcat-docs-webapp | <7.0.76-9.el7 | 7.0.76-9.el7 |
redhat/tomcat-el | <2.2-api-7.0.76-9.el7 | 2.2-api-7.0.76-9.el7 |
redhat/tomcat-javadoc | <7.0.76-9.el7 | 7.0.76-9.el7 |
redhat/tomcat-jsp | <2.2-api-7.0.76-9.el7 | 2.2-api-7.0.76-9.el7 |
redhat/tomcat-jsvc | <7.0.76-9.el7 | 7.0.76-9.el7 |
redhat/tomcat-lib | <7.0.76-9.el7 | 7.0.76-9.el7 |
redhat/tomcat-servlet | <3.0-api-7.0.76-9.el7 | 3.0-api-7.0.76-9.el7 |
redhat/tomcat-webapps | <7.0.76-9.el7 | 7.0.76-9.el7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2019:2205 is categorized as moderate.
To fix RHSA-2019:2205, you should upgrade to the packages provided in version 7.0.76-9.el7 or later.
RHSA-2019:2205 addresses a vulnerability related to incorrect handling of empty string URLs in security constraints leading to potential resource exposure.
The affected packages include tomcat, tomcat-admin-webapps, tomcat-docs-webapp, tomcat-javadoc, tomcat-jsvc, tomcat-lib, and tomcat-webapps among others.
It is not safe to continue using affected versions, as they may expose sensitive resources and compromise security.