低危 Apache Tomcat 安全绕过漏洞
CVE编号
CVE-2018-8014利用情况
暂无补丁情况
官方补丁披露时间
2018-05-17漏洞描述
Apachetomcat 9.0.0.m1至9.0.8、8.5.0至8.5.31、8.0.rc1至8.0.52、7.0.41至7.0.88中提供的CORS过滤器的默认设置是不安全的,并启用了所有来源的“supportsCredentials”。据预期,CORS过滤器的用户将为他们的环境适当地配置它,而不是在默认配置中使用它。因此,预计大多数用户不会受到这一问题的影响。 解决建议
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:https://lists.apache.org/thread.html/fbfb713e4f8a4c0f81089b89450828011343593800cae3fb629192b1@%3Cannounce.tomcat.apache.org%3E受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | apache | tomcat | * | From (including) 7.0.41 | Up to (including) 7.0.88 | ||||
运行在以下环境 | |||||||||
应用 | apache | tomcat | * | From (including) 8.0.0 | Up to (including) 8.0.52 | ||||
运行在以下环境 | |||||||||
应用 | apache | tomcat | * | From (including) 8.5.0 | Up to (including) 8.5.31 | ||||
运行在以下环境 | |||||||||
应用 | apache | tomcat | * | From (including) 9.0.0 | Up to (including) 9.0.8 | ||||
运行在以下环境 | |||||||||
应用 | apache | tomcat | 8.0.0 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | tomcat | 9.0.0 | - | |||||
运行在以下环境 | |||||||||
应用 | netapp | oncommand_insight | - | - | |||||
运行在以下环境 | |||||||||
应用 | netapp | oncommand_unified_manager | * | From (including) 7.3 | |||||
运行在以下环境 | |||||||||
应用 | netapp | oncommand_unified_manager | * | From (including) 9.4 | |||||
运行在以下环境 | |||||||||
应用 | netapp | oncommand_workflow_automation | - | - | |||||
运行在以下环境 | |||||||||
应用 | netapp | snapcenter_server | - | - | |||||
运行在以下环境 | |||||||||
应用 | netapp | storage_automation_store | - | - | |||||
运行在以下环境 | |||||||||
系统 | amazon_2 | tomcat | * | Up to (excluding) 3.0-api-7.0.76-10.amzn2.0.1 | |||||
运行在以下环境 | |||||||||
系统 | amazon_AMI | tomcat8 | * | Up to (excluding) 3.0-api-7.0.90-1.33.amzn1 | |||||
运行在以下环境 | |||||||||
系统 | canonical | ubuntu_linux | 14.04 | - | |||||
运行在以下环境 | |||||||||
系统 | canonical | ubuntu_linux | 16.04 | - | |||||
运行在以下环境 | |||||||||
系统 | canonical | ubuntu_linux | 17.10 | - | |||||
运行在以下环境 | |||||||||
系统 | canonical | ubuntu_linux | 18.04 | - | |||||
运行在以下环境 | |||||||||
系统 | centos_7 | tomcat | * | Up to (excluding) 7.0.76-9.el7 | |||||
运行在以下环境 | |||||||||
系统 | centos_8 | python-nss-doc | * | Up to (excluding) 3.0.26-3.module+el8.0.0+3248+9d514f3b | |||||
运行在以下环境 | |||||||||
系统 | debian | debian_linux | 8.0 | - | |||||
运行在以下环境 | |||||||||
系统 | debian_10 | tomcat9 | * | Up to (excluding) 9.0.31-1~deb10u6 | |||||
运行在以下环境 | |||||||||
系统 | debian_11 | tomcat9 | * | Up to (excluding) 9.0.43-2~deb11u6 | |||||
运行在以下环境 | |||||||||
系统 | debian_12 | tomcat9 | * | Up to (excluding) 9.0.70-2 | |||||
运行在以下环境 | |||||||||
系统 | debian_sid | tomcat9 | * | Up to (excluding) 9.0.70-2 | |||||
运行在以下环境 | |||||||||
系统 | fedora_27 | tomcat-webapps | * | Up to (excluding) 8.0.53-1.fc27 | |||||
运行在以下环境 | |||||||||
系统 | fedora_28 | tomcat-webapps | * | Up to (excluding) 8.5.32-1.fc28 | |||||
运行在以下环境 | |||||||||
系统 | fedora_EPEL_6 | tomcat-lib | * | Up to (excluding) 7.0.90-1.el6 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_aarch64_V10 | tomcat | * | Up to (excluding) 7.0.76-16.el7_9 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_x86_64_V10 | tomcat | * | Up to (excluding) 7.0.76-16.el7_9 | |||||
运行在以下环境 | |||||||||
系统 | microsoft | windows | - | - | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.0 | tomcat-docs-webapp | * | Up to (excluding) 9.0.10-lp150.2.3.2 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_42.3 | tomcat-docs-webapp | * | Up to (excluding) 8.0.53-15.1 | |||||
运行在以下环境 | |||||||||
系统 | oracle_7 | oraclelinux-release | * | Up to (excluding) 7.0.76-9.el7 | |||||
运行在以下环境 | |||||||||
系统 | oracle_8 | oraclelinux-release | * | Up to (excluding) 1.7-24.module+el8.0.0+5231+3e842911 | |||||
运行在以下环境 | |||||||||
系统 | redhat_7 | tomcat | * | Up to (excluding) 7.0.76-9.el7 | |||||
运行在以下环境 | |||||||||
系统 | redhat_8 | python-nss-doc | * | Up to (excluding) 3.0.26-3.module+el8.0.0+3248+9d514f3b | |||||
运行在以下环境 | |||||||||
系统 | suse_12 | tomcat | * | Up to (excluding) 8.0.53-29.13 | |||||
运行在以下环境 | |||||||||
系统 | suse_12_SP3 | tomcat-el-3_0-api | * | Up to (excluding) 8.0.53-29.13.1 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_14.04 | tomcat7 | * | Up to (excluding) 7.0.52-1ubuntu0.14 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_14.04.6_lts | tomcat7 | * | Up to (excluding) 7.0.52-1ubuntu0.14 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04 | tomcat7 | * | Up to (excluding) 8.0.32-1ubuntu1.6 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04.7_lts | tomcat8 | * | Up to (excluding) 8.0.32-1ubuntu1.6 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04 | tomcat8 | * | Up to (excluding) 8.5.30-1ubuntu1.2 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04.5_lts | tomcat8 | * | Up to (excluding) 8.5.30-1ubuntu1.2 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.10 | tomcat8 | * | Up to (excluding) 8.5.30-1ubuntu3 | |||||
- 攻击路径 远程
- 攻击复杂度 复杂
- 权限要求 无需权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 100
CWE-ID | 漏洞类型 |
CWE-1188 | 不安全的默认资源初始化 |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论