Search for packages
Package details: pkg:deb/ubuntu/tomcat8@8.0.38-2ubuntu1
purl pkg:deb/ubuntu/tomcat8@8.0.38-2ubuntu1
Next non-vulnerable version 8.5.39-1ubuntu1~18.04.3
Latest non-vulnerable version 8.5.39-1ubuntu1~18.04.3
Risk 10.0
Vulnerabilities affecting this package (17)
Vulnerability Summary Fixed by
VCID-11gb-2qp7-aaaj
Aliases:
CVE-2017-5648
GHSA-3vx3-xf6q-r5xp
Exposure of Resource to Wrong Sphere Some calls to application listeners in Apache Tomcat did not use the appropriate facade object. When running an untrusted application under a SecurityManager, it was therefore possible for that untrusted application to retain a reference to the request or response object and thereby access and/or modify information associated with another web application.
8.5.21-1ubuntu1
Affected by 13 other vulnerabilities.
VCID-2nrx-8urf-aaaf
Aliases:
CVE-2019-0221
GHSA-jjpq-gp5q-8q6w
Cross-site scripting in Apache Tomcat
8.5.39-1ubuntu1~18.04.3
Affected by 0 other vulnerabilities.
VCID-7c2n-n9ga-aaar
Aliases:
CVE-2018-8034
GHSA-46j3-r4pj-4835
The host name verification missing in Apache Tomcat
8.5.39-1ubuntu1~18.04.1
Affected by 2 other vulnerabilities.
VCID-7qs4-bekd-aaab
Aliases:
CVE-2018-11784
GHSA-5q99-f34m-67gc
Moderate severity vulnerability that affects org.apache.tomcat.embed:tomcat-embed-core
8.5.39-1ubuntu1~18.04.1
Affected by 2 other vulnerabilities.
VCID-983g-2nuz-aaaa
Aliases:
CVE-2019-10072
GHSA-q4hg-rmq2-52q9
Improper Locking in Apache Tomcat
8.5.39-1ubuntu1~18.04.3
Affected by 0 other vulnerabilities.
VCID-9pu2-we8w-aaar
Aliases:
CVE-2018-1305
GHSA-jx6h-3fjx-cgv5
Moderate severity vulnerability that affects org.apache.tomcat.embed:tomcat-embed-core
8.5.30-1ubuntu1
Affected by 8 other vulnerabilities.
VCID-ah95-hj74-aaaq
Aliases:
CVE-2017-12617
GHSA-xjgh-84hx-56c5
Unrestricted Upload of File with Dangerous Type When running Apache Tomcat with HTTP PUTs enabled it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.
8.5.30-1ubuntu1
Affected by 8 other vulnerabilities.
VCID-b2z1-15m4-aaac
Aliases:
CVE-2018-1336
GHSA-m59c-jpc8-m2x4
In Apache Tomcat there is an improper handing of overflow in the UTF-8 decoder
8.5.39-1ubuntu1~18.04.1
Affected by 2 other vulnerabilities.
VCID-cp4z-y57s-aaah
Aliases:
CVE-2018-8014
GHSA-r4x2-3cq5-hqvp
The defaults settings for the CORS filter provided in Apache Tomcat are insecure and enable 'supportsCredentials' for all origins
8.5.30-1ubuntu1.2
Affected by 7 other vulnerabilities.
VCID-d82s-fpes-aaar
Aliases:
CVE-2018-1304
GHSA-6rxj-58jh-436r
Moderate severity vulnerability that affects org.apache.tomcat.embed:tomcat-embed-core
8.5.30-1ubuntu1
Affected by 8 other vulnerabilities.
VCID-h3d2-7evg-aaac
Aliases:
CVE-2018-8037
GHSA-6v52-mj5r-7j2m
Moderate severity vulnerability that affects org.apache.tomcat.embed:tomcat-embed-core
8.5.39-1ubuntu1~18.04.1
Affected by 2 other vulnerabilities.
VCID-jtsq-4sgf-aaag
Aliases:
CVE-2017-7674
GHSA-73rx-3f9r-x949
Insufficient Verification of Data Authenticity The CORS Filter in Apache Tomcat does not add an HTTP Vary header indicating that the response varies depending on Origin. This permitted client and server side cache poisoning in some circumstances.
8.5.21-1
Affected by 15 other vulnerabilities.
VCID-m8ve-za8b-aaap
Aliases:
CVE-2017-12616
GHSA-8qq4-8jvq-mfw4
Information Exposure When using a `VirtualDirContext` with Apache Tomcat it is possible to bypass security constraints and/or view the source code of JSPs for resources served by the `VirtualDirContext` using a specially crafted request.
8.5.30-1ubuntu1
Affected by 8 other vulnerabilities.
VCID-u7ka-jfwa-aaam
Aliases:
CVE-2017-15706
GHSA-372q-33vh-8mpc
Improperly Implemented Security Check for Standard Some scripts may have failed to execute as expected and other scripts may have been executed unexpectedly. Note that the behaviour of the CGI servlet has remained unchanged in this regard. It is only the documentation of the behaviour that was wrong and has been corrected.
8.5.30-1ubuntu1
Affected by 8 other vulnerabilities.
VCID-w4q7-4d2t-aaan
Aliases:
CVE-2017-5647
GHSA-3gv7-3h64-78cm
Information Exposure When "send file" is used, results in the pipelined request being lost when send file processing of the previous request completed. This could result in responses appearing to be sent for the wrong request. For example, a user agent that sent requests A, B and C could see the correct response for request A, the response for request C for request B and no response for request C.
8.5.21-1ubuntu1
Affected by 13 other vulnerabilities.
VCID-yv8m-r56n-aaan
Aliases:
CVE-2017-5664
GHSA-jmvv-524f-hj5j
Improper Handling of Exceptional Conditions The error page mechanism of the Java Servlet Specification requires that, when an error occurs and an error page is configured for the error that occurred, the original request and response are forwarded to the error page. The Default Servlet in Apache Tomcat does not do this. Depending on the original request this could lead to unexpected and undesirable results for static error pages including, if the DefaultServlet is configured to permit writes, the replacement or removal of the custom error page. Notes for other user provided error pages: (1) Unless explicitly coded otherwise, JSPs ignore the HTTP method. JSPs used as error pages must ensure that they handle any error dispatch as a GET request, regardless of the actual method. (2) By default, the response generated by a Servlet does depend on the HTTP method. Custom Servlets used as error pages must ensure that they handle any error dispatch as a GET request, regardless of the actual method.
8.5.21-1
Affected by 15 other vulnerabilities.
VCID-zxmb-hhr6-aaap
Aliases:
CVE-2019-0199
GHSA-qcxh-w3j9-58qr
Denial of Service in Tomcat
8.5.39-1ubuntu1~18.04.1
Affected by 2 other vulnerabilities.
Vulnerabilities fixed by this package (5)
Vulnerability Summary Aliases
VCID-3c66-9v5f-aaap The postinst script in the tomcat6 package before 6.0.45+dfsg-1~deb7u4 on Debian wheezy, before 6.0.35-1ubuntu3.9 on Ubuntu 12.04 LTS and on Ubuntu 14.04 LTS; the tomcat7 package before 7.0.28-4+deb7u8 on Debian wheezy, before 7.0.56-3+deb8u6 on Debian jessie, before 7.0.52-1ubuntu0.8 on Ubuntu 14.04 LTS, and on Ubuntu 12.04 LTS, 16.04 LTS, and 16.10; and the tomcat8 package before 8.0.14-1+deb8u5 on Debian jessie, before 8.0.32-1ubuntu1.3 on Ubuntu 16.04 LTS, before 8.0.37-1ubuntu0.1 on Ubuntu 16.10, and before 8.0.38-2ubuntu1 on Ubuntu 17.04 might allow local users with access to the tomcat account to obtain sensitive information or gain root privileges via a symlink attack on the Catalina localhost directory. CVE-2016-9774
VCID-4k6k-v1hy-aaap The postrm script in the tomcat6 package before 6.0.45+dfsg-1~deb7u3 on Debian wheezy, before 6.0.45+dfsg-1~deb8u1 on Debian jessie, before 6.0.35-1ubuntu3.9 on Ubuntu 12.04 LTS and on Ubuntu 14.04 LTS; the tomcat7 package before 7.0.28-4+deb7u7 on Debian wheezy, before 7.0.56-3+deb8u6 on Debian jessie, before 7.0.52-1ubuntu0.8 on Ubuntu 14.04 LTS, and on Ubuntu 12.04 LTS, 16.04 LTS, and 16.10; and the tomcat8 package before 8.0.14-1+deb8u5 on Debian jessie, before 8.0.32-1ubuntu1.3 on Ubuntu 16.04 LTS, before 8.0.37-1ubuntu0.1 on Ubuntu 16.10, and before 8.0.38-2ubuntu1 on Ubuntu 17.04 might allow local users with access to the tomcat account to gain root privileges via a setgid program in the Catalina directory, as demonstrated by /etc/tomcat8/Catalina/attack. CVE-2016-9775
VCID-p378-4jg4-aaam Information Exposure A bug in the error handling of the NIO HTTP connector in Apache Tomcat resulted in the current Processor object being added to the Processor cache multiple times. This in turn meant that the same Processor could be used for concurrent requests. Sharing a Processor can result in information leakage. CVE-2016-8745
GHSA-w3j5-q8f2-3cqq
VCID-q1t4-rzf5-aaac The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own. CVE-2016-6816
GHSA-jc7p-5r39-9477
VCID-sc5t-244h-aaas Remote code execution is possible with Apache Tomcat before 6.0.48, 7.x before 7.0.73, 8.x before 8.0.39, 8.5.x before 8.5.7, and 9.x before 9.0.0.M12 if JmxRemoteLifecycleListener is used and an attacker can reach JMX ports. The issue exists because this listener wasn't updated for consistency with the CVE-2016-3427 Oracle patch that affected credential types. CVE-2016-8735
GHSA-cw54-59pw-4g8c

Date Actor Action Vulnerability Source VulnerableCode Version