VYPR

Maven package

org.apache.tomcat.embed/tomcat-embed-core

pkg:maven/org.apache.tomcat.embed/tomcat-embed-core

Vulnerabilities (60)

  • CVE-2020-1935Feb 24, 2020
    affected < 7.0.100fixed 7.0.100

    In Apache Tomcat 9.0.0.M1 to 9.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99 the HTTP header parsing code used an approach to end-of-line parsing that allowed some invalid HTTP headers to be parsed as valid. This led to a possibility of HTTP Request Smuggling if Tomcat was located be

  • CVE-2019-17569Feb 24, 2020
    affected >= 7.0.98, < 7.0.100fixed 7.0.100

    The refactoring present in Apache Tomcat 9.0.28 to 9.0.30, 8.5.48 to 8.5.50 and 7.0.98 to 7.0.99 introduced a regression. The result of the regression was that invalid Transfer-Encoding headers were incorrectly processed leading to a possibility of HTTP Request Smuggling if Tomca

  • CVE-2019-12418Dec 23, 2019
    affected < 7.0.99fixed 7.0.99

    When Apache Tomcat 9.0.0.M1 to 9.0.28, 8.5.0 to 8.5.47, 7.0.0 and 7.0.97 is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files is able to manipulate the RMI registry to perform a man-in-the-middle attack

  • CVE-2019-17563Dec 23, 2019
    affected < 7.0.99fixed 7.0.99

    When using FORM authentication with Apache Tomcat 9.0.0.M1 to 9.0.29, 8.5.0 to 8.5.49 and 7.0.0 to 7.0.98 there was a narrow window where an attacker could perform a session fixation attack. The window was considered too narrow for an exploit to be practical but, erring on the si

  • CVE-2019-10072Jun 21, 2019
    affected >= 9.0.0.M1, < 9.0.20fixed 9.0.20

    The fix for CVE-2019-0199 was incomplete and did not address HTTP/2 connection window exhaustion on write in Apache Tomcat versions 9.0.0.M1 to 9.0.19 and 8.5.0 to 8.5.40 . By not sending WINDOW_UPDATE messages for the connection window (stream 0) clients were able to cause serve

  • CVE-2019-0221May 28, 2019
    affected >= 9.0.0, < 9.0.17fixed 9.0.17

    The SSI printenv command in Apache Tomcat 9.0.0.M1 to 9.0.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 echoes user provided data without escaping and is, therefore, vulnerable to XSS. SSI is disabled by default. The printenv command is intended for debugging and is unlikely to be pr

  • CVE-2019-0232Apr 15, 2019
    affected >= 9.0.0.M1, < 9.0.17fixed 9.0.17

    When running on Windows with enableCmdLineArguments enabled, the CGI Servlet in Apache Tomcat 9.0.0.M1 to 9.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 is vulnerable to Remote Code Execution due to a bug in the way the JRE passes command line arguments to Windows. The CGI Servlet i

  • CVE-2018-11784Oct 4, 2018
    affected >= 8.5.0, < 8.5.34fixed 8.5.34

    When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated

  • CVE-2018-8037Aug 2, 2018
    affected >= 9.0.0.M9, < 9.0.10fixed 9.0.10

    If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors

  • CVE-2018-1336Aug 2, 2018
    affected >= 9.0.0.M9, < 9.0.8fixed 9.0.8

    An improper handing of overflow in the UTF-8 decoder with supplementary characters can lead to an infinite loop in the decoder causing a Denial of Service. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.7, 8.5.0 to 8.5.30, 8.0.0.RC1 to 8.0.51, and 7.0.28 to 7.0.86.

  • CVE-2018-8034Aug 1, 2018
    affected >= 9.0.0, < 9.0.10fixed 9.0.10

    The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88.

  • CVE-2018-8014May 16, 2018
    affected >= 9.0.0.M1, < 9.0.9fixed 9.0.9

    The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to 9.0.8, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, 7.0.41 to 7.0.88 are insecure and enable 'supportsCredentials' for all origins. It is expected that users of the CORS filter will have configured it approp

  • CVE-2018-1304Feb 28, 2018
    affected >= 9.0.0, < 9.0.5fixed 9.0.5

    The URL pattern of "" (the empty string) which exactly maps to the context root was not correctly handled in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 when used as part of a security constraint definition. This caused the constraint

  • CVE-2018-1305Feb 23, 2018
    affected >= 9.0.0M1, < 9.0.5fixed 9.0.5

    Security constraints defined by annotations of Servlets in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 were only applied once a Servlet had been loaded. Because security constraints defined in this way apply to the URL pattern and any

  • CVE-2017-12617HigKEVOct 4, 2017
    affected >= 9.0.0.M1, < 9.0.1fixed 9.0.1

    When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a

  • CVE-2017-12615HigKEVSep 19, 2017
    affected >= 7.0.0, < 7.0.79fixed 7.0.79

    When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and a

  • CVE-2017-5651CriApr 17, 2017
    affected >= 9.0.0.M1, < 9.0.0.M19fixed 9.0.0.M19

    In Apache Tomcat 9.0.0.M1 to 9.0.0.M18 and 8.5.0 to 8.5.12, the refactoring of the HTTP connectors introduced a regression in the send file processing. If the send file processing completed quickly, it was possible for the Processor to be added to the processor cache twice. This

  • CVE-2017-5648CriApr 17, 2017
    affected >= 9.0.0.M1, < 9.0.0.M18fixed 9.0.0.M18

    While investigating bug 60718, it was noticed that some calls to application listeners in Apache Tomcat 9.0.0.M1 to 9.0.0.M17, 8.5.0 to 8.5.11, 8.0.0.RC1 to 8.0.41, and 7.0.0 to 7.0.75 did not use the appropriate facade object. When running an untrusted application under a Securi

  • CVE-2014-0095May 31, 2014
    affected >= 8.0.0-RC1, < 8.0.4fixed 8.0.4

    java/org/apache/coyote/ajp/AbstractAjpProcessor.java in Apache Tomcat 8.x before 8.0.4 allows remote attackers to cause a denial of service (thread consumption) by using a "Content-Length: 0" AJP request to trigger a hang in request processing.

  • CVE-2008-1947Jun 4, 2008
    affected >= 5.5.9, < 5.5.27fixed 5.5.27

    Cross-site scripting (XSS) vulnerability in Apache Tomcat 5.5.9 through 5.5.26 and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via the name parameter (aka the hostname attribute) to host-manager/html/add.

Page 3 of 3