Remote code execution in Apache Tomcat

Published: 2019-04-11 12:17:41 | Updated: 2019-04-22
Severity High
Patch available YES
Number of vulnerabilities 1
CVE ID CVE-2019-0232
CVSSv3 7.8 [CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CWE ID CWE-78
Exploitation vector Network
Public exploit N/A
Vulnerable software Apache Tomcat
Vulnerable software versions Apache Tomcat 9.0.16
Apache Tomcat 9.0.14
Apache Tomcat 9.0.13

Show more

Vendor URL Apache Foundation

Security Advisory

UPDATED: 22.04.2019
Added fixed version to the advisory. Advisory status changed to Patched.

1) OS Command Injection

Description

The vulnerability allows a remote attacker to execute arbitrary commands on the target system.

The vulnerability exists due to an input validation error within the CGI Servlet when passing arguments from JRE to the Windows environment. A remote attacker can send a specially crafted request to the CGI Servlet, inject and execute arbitrary OS commands on the system with Apache Tomcat privileges.

Successful exploitation of the vulnerability requires that Apache Tomcat is installed on Windows operating system with enabled option “enableCmdLineArguments” (CGI Servlet and “enableCmdLineArguments” option are disabled by default).

Remediation

Install update from vendor's website.

External links

http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.18
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.40
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.94

Back to List