-
Notifications
You must be signed in to change notification settings - Fork 0
Description
CVE-2018-8037 - Medium Severity Vulnerability
Vulnerable Library - tomcat-embed-core-8.5.31.jar
Core Tomcat implementation
path: /root/.m2/repository/org/apache/tomcat/embed/tomcat-embed-core/8.5.31/tomcat-embed-core-8.5.31.jar
Library home page: http://tomcat.apache.org/
Dependency Hierarchy:
- spring-boot-starter-web-2.0.3.RELEASE.jar (Root Library)
- spring-boot-starter-tomcat-2.0.3.RELEASE.jar
- ❌ tomcat-embed-core-8.5.31.jar (Vulnerable Library)
- spring-boot-starter-tomcat-2.0.3.RELEASE.jar
Vulnerability Details
If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31.
Publish Date: 2018-08-02
URL: CVE-2018-8037
CVSS 3 Score Details (5.9)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: http://www.securitytracker.com/id/1041376
Fix Resolution: The vendor has issued a fix (8.5.32, 9.0.10).
The vendor advisories are available at:
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
Step up your Open Source Security Game with WhiteSource here