When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
08 Dec 2023, 16:41
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
CPE | cpe:2.3:a:apache:tomcat:9.0.0:m22:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:m19:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:m20:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:m2:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:m15:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:m21:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:m27:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:m6:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:m4:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:m23:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:m12:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:m25:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:m3:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:m8:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:m24:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:m1:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:m26:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:m7:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:m14:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:m17:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:m11:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:m9:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:m18:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:m13:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:m5:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:m16:*:*:*:*:*:* |
cpe:2.3:a:apache:tomcat:9.0.0:milestone16:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone15:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone8:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone27:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone9:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone1:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone13:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone17:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone26:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone23:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone20:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone7:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone2:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone24:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone22:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone5:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone19:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone21:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone11:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone3:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone12:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone6:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone25:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone18:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone4:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone14:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone10:*:*:*:*:*:* |
Information
Published : 2018-10-04 13:29
Updated : 2024-02-04 20:03
NVD link : CVE-2018-11784
Mitre link : CVE-2018-11784
CVE.ORG link : CVE-2018-11784
JSON object : View
Products Affected
oracle
- hospitality_guest_access
- communications_application_session_controller
- secure_global_desktop
- instantis_enterprisetrack
- retail_order_broker
apache
- tomcat
debian
- debian_linux
redhat
- enterprise_linux_server_tus
- enterprise_linux_server_aus
- enterprise_linux_workstation
- enterprise_linux_server_eus
- enterprise_linux_server
- enterprise_linux_desktop
netapp
- snap_creator_framework
canonical
- ubuntu_linux
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')