Apache Tomcat CORS Filter 安全特征问题漏洞
CNNVD-ID编号 | CNNVD-201805-475 | CVE编号 | CVE-2018-8014 |
发布时间 | 2018-05-17 | 更新时间 | 2020-10-22 |
漏洞类型 | 安全特征问题 | 漏洞来源 | N/A |
危险等级 | 超危 | 威胁类型 | 远程 |
厂商 | apache |
漏洞介绍
Apache Tomcat是美国阿帕奇(Apache)软件基金会下属的Jakarta项目的一款轻量级Web应用服务器,它主要用于开发和调试JSP程序,适用于中小型系统。CORS Filter是其中的一个提供跨源资源共享功能的组件。
Apache Tomcat中存在安全漏洞,该漏洞源于不安全的CORS过滤器默认设置。远程攻击者可利用该漏洞对系统发起攻击。以下版本受到影响:Apache Tomcat 9.0.0.M1版本至9.0.8版本,8.5.0版本至8.5.31版本,8.0.0.RC1版本至8.0.52版本,7.0.41版本至7.0.88版本。
漏洞补丁
目前厂商已发布升级了Apache Tomcat CORS Filter 安全特征问题漏洞的补丁,Apache Tomcat CORS Filter 安全特征问题漏洞的补丁获取链接:
https://lists.apache.org/thread.html/fbfb713e4f8a4c0f81089b89450828011343593800cae3fb629192b1@%3Cannounce.tomcat.apache.org%3E
参考网址
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2019:1529
来源:MLIST
来源:CONFIRM
链接:http://tomcat.apache.org/security-8.html
来源:BID
链接:http://www.securityfocus.com/bid/104203
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2018:2470
来源:BID
链接:https://www.securityfocus.com/bid/104203
来源:MLIST
来源:MLIST
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2018:2469
来源:MLIST
来源:MLIST
来源:CONFIRM
链接:http://tomcat.apache.org/security-9.html
来源:CONFIRM
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2019/08/msg00015.html
来源:MLIST
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html
来源:CONFIRM
链接:https://security.netapp.com/advisory/ntap-20181018-0002/
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2019:2205
来源:MLIST
来源:MLIST
来源:UBUNTU
链接:https://usn.ubuntu.com/3665-1/
来源:MLIST
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2018:3768
来源:MLIST
来源:CONFIRM
链接:http://tomcat.apache.org/security-7.html
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2019:0451
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2019:0450
来源:SECTRACK
链接:http://www.securitytracker.com/id/1041888
来源:SECTRACK
链接:http://www.securitytracker.com/id/1040998
来源:CONFIRM
链接:http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
来源:MLIST
来源:MLIST
来源:access.redhat.com
链接:https://access.redhat.com/errata/RHSA-2019:2205
来源:lists.debian.org
链接:https://lists.debian.org/debian-lts-announce/2019/08/msg00015.html
来源:access.redhat.com
链接:https://access.redhat.com/errata/RHSA-2019:0450
来源:access.redhat.com
链接:https://access.redhat.com/errata/RHSA-2019:1529
来源:www.debian.org
链接:https://www.debian.org/security/2019/dsa-4596
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.3098/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0014/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.2975/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3250/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/76458
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.2181/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/153934/Red-Hat-Security-Advisory-2019-2205-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/155792/Debian-Security-Advisory-4596-1.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/153340/Red-Hat-Security-Advisory-2019-1529-01.html
受影响实体
Apache Tomcat:7.0.41 Apache Tomcat:7.0.42 Apache Tomcat:7.0.43 Apache Tomcat:7.0.44 Apache Tomcat:7.0.45信息来源
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201805-475

评论