CVE-2019-12418 - JMX Remote Lifecycle Listener

Severity

7.5

When TomEE or Tomcat is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files is able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and gain complete control over the Tomcat instance.

Project

Apache Tomcat & Apache TomEE

Type

MITM/RCE

MITM/RCE = Remote Code Exploit. RCEs pose a serious threat as they allow attackers to inject code into your system and execute it.

Versions affected

Apache Tomcat

Tomcat 6.x
All
Tomcat 7.x
7.0.0 to 7.0.99
Tomcat 8.0.x
All
Tomcat 8.5.x
8.5.0 to 8.5.50
Tomcat 9.x
9.0.0.M1 to 9.0.0.30

Apache TomEE

TomEE 1.7.x
All
TomEE 7.0.x
7.0.0-M1 to 7.0.7
TomEE 7.1.x
7.1.0 to 7.1.2
TomEE 8.0.x
8.0.0-M1 to 8.0.1
Feel Vulnerable? 

Contact us so we can help you.


* These fields are required.