Skip to main content

CVE-2018-8031

Severity

6.1

Description

The Apache TomEE console (tomee-webapp) has a XSS vulnerability which could allow javascript to be executed if the user is given a malicious URL. This web application is typically used to add TomEE features to a Tomcat installation. The TomEE bundles do not ship with this application included. This issue can be mitigated by removing the application after TomEE is setup (if using the application to install TomEE), using one of the provided pre-configured bundles, or by upgrading to TomEE 7.0.5. This issue is resolve in this commit: b8bbf50c23ce97dd64f3a5d77f78f84e47579863.

Mitigation

We recommend upgrading to a version of this component that is not vulnerable to this specific issue.
```
This issue can also be mitigated by removing the application after TomEE is setup (if using the application to install TomEE) or using one of the provided pre-configured bundles.
```
Reference: https://lists.apache.org/thread.html/c4b0d83a534d6cdf2de54dbbd00e3538072ac2e360781b784608ed0d@%3Cdev.tomee.apache.org%3E
Download link for pre-configured bundles: http://tomee.apache.org/downloads.html

Project

Apache TomEE

Category
Cross site scripting (XSS)
Tags
data
Date Disclosed

2018-07-23

Date Discovered

2018-03-09

Apache TomEE 1.7.x

First release:
2014-08-09
CVEs:
95
Support Lifecycle:
Namespace:
javax
Feel Vulnerable? 

Contact us so we can help you.

* These fields are required.