Skip to main content

CVE-2018-11784

Severity

6.1

Description

When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice.

Mitigation

We recommend upgrading to a version of this component that is not vulnerable to this specific issue.

Workaround:
>Use mapperDirectoryRedirectEnabled="true" and mapperContextRootRedirectEnabled="true" on the Context to ensure that redirects are issued by the Mapper rather than the default Servlet. See the Context configuration documentation for further important details.

Reference: [http://mail-archives.us.apache.org/mod_mbox/www-announce/201810.mbox/%[email protected]%3E](http://mail-archives.us.apache.org/mod_mbox/www-announce/201810.mbox/%[email protected]%3E)

Project

Apache Tomcat

Apache TomEE

Category
Open Redirect
Tags
data
Date Disclosed

2018-10-03

Date Discovered

2018-06-05

Apache Tomcat 9.0.x

First release:
2018-01-18
CVEs:
49
Support Lifecycle:
Namespace:
javax

Apache TomEE 7.1.x

First release:
2018-09-02
CVEs:
81
Support Lifecycle:
Namespace:
javax

Apache TomEE 7.0.x

First release:
2016-05-17
CVEs:
111
Support Lifecycle:
Namespace:
javax

Apache Tomcat 7.0.x

First release:
2011-01-14
First release:
2021-03-31
CVEs:
55
Support Lifecycle:
Namespace:
javax

Apache TomEE 1.7.x

First release:
2014-08-09
CVEs:
95
Support Lifecycle:
Namespace:
javax
Feel Vulnerable? 

Contact us so we can help you.

* These fields are required.