Apache Tomcat Missing Check in WebSocket Client Lets Remote Users Bypass Hostname Verification on the Target System
|
SecurityTracker Alert ID: 1041374 |
SecurityTracker URL: http://securitytracker.com/id/1041374
|
CVE Reference:
CVE-2018-8034
(Links to External Site)
|
Date: Jul 26 2018
|
Impact:
Host/resource access via network, Modification of system information, Modification of user information
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 7.0.25 to 7.0.88, 8.0.0.RC1 to 8.0.52, 8.5.0 to 8.5.31, 9.0.0.M1 to 9.0.9
|
Description:
A vulnerability was reported in Apache Tomcat. A remote user can bypass security controls on the target system.
A remote user can exploit a flaw in the WebSocket client for TLS connections to bypass host name verification.
|
Impact:
A remote user can bypass host name verification for TLS connections.
|
Solution:
The vendor has issued a fix (7.0.90, 8.0.53, 8.5.32, 9.0.10).
The vendor advisories are available at:
https://tomcat.apache.org/security-7.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
|
Vendor URL: tomcat.apache.org/security-9.html (Links to External Site)
|
Cause:
Authentication error
|
Underlying OS: Linux (Any), UNIX (Any), Windows (Any)
|
|
Message History:
This archive entry has one or more follow-up message(s) listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|