Name | CVE-2018-11784 |
Description | When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-1544-1, DLA-1545-1, DSA-4596-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
tomcat9 (PTS) | bullseye (security), bullseye | 9.0.43-2~deb11u10 | fixed |
| bookworm | 9.0.70-2 | fixed |
| sid, trixie | 9.0.95-1 | fixed |
The information below is based on the following data on fixed versions.
Notes
- tomcat9 <not-affected> (Fixed before initial upload to Debian)
tomcat8.0 builds only tomcat8.0-user and libtomcat8.0-java
Since 7.0.72-3, src:tomcat7 only builds the Servlet API
Fixed upstream in 9.0.12, 8.5.34, 7.0.91
https://lists.apache.org/thread.html/23134c9b5a23892a205dc140cdd8c9c0add233600f76b313dda6bd75@%3Cannounce.tomcat.apache.org%3E
https://svn.apache.org/r1840055 (9.0.x)
https://svn.apache.org/r1840056 (8.5.x)
https://svn.apache.org/r1840057 (7.0.x)