[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

Open redirection vulnerability in default servlet in Apache Tomcat

ID: oval:org.secpod.oval:def:47875Date: (C)2018-10-08   (M)2023-12-20
Class: VULNERABILITYFamily: windows




The host is installed with Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 or 7.0.23 to 7.0.90 and is prone to an open redirection vulnerability. A flaw is present in the application which fails to handle the issue in default servlet which returned a redirect to a directory. Successful exploitation allows attackers to pass a specially crafted URL to cause the redirect to be generated to any URI of the attackers choice.

Platform:
Microsoft Windows Server 2022
Microsoft Windows 11
Microsoft Windows Server 2019
Microsoft Windows 7
Microsoft Windows 10
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2016
Microsoft Windows Vista
Microsoft Windows XP
Microsoft Windows 8
Microsoft Windows 8.1
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Product:
Apache Tomcat
Reference:
CVE-2018-11784
CVE    1
CVE-2018-11784
CPE    21
cpe:/a:apache:tomcat:9.0.0:m10
cpe:/a:apache:tomcat:9.0.0:m1
cpe:/a:apache:tomcat:9.0.0:m20
cpe:/a:apache:tomcat:9.0.0:m3
...

© SecPod Technologies