[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247621

 
 

909

 
 

194512

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Apache Tomcat - (bulletinoct2018)

ID: oval:org.secpod.oval:def:2103427Date: (C)2020-01-07   (M)2023-12-14
Class: PATCHFamily: unix




When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to "/foo/" when the user requested "/foo") a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice.

Platform:
Sun Solaris 11
Product:
web/java-servlet/tomcat-8
web/java-servlet/tomcat-8/tomcat-examples
web/java-servlet/tomcat-8/tomcat-admin
Reference:
bulletinoct2018
CVE-2018-11784
CVE-2018-8034
CVE    2
CVE-2018-11784
CVE-2018-8034
CPE    1
cpe:/o:oracle:solaris:11

© SecPod Technologies