Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2019-12418


When Apache Tomcat 9.0.0.M1 to 9.0.28, 8.5.0 to 8.5.47, 7.0.0 and 7.0.97 is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files is able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and gain complete control over the Tomcat instance.


Published

2019-12-23T18:15:10.753

Last Modified

2024-11-21T04:22:48.020

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.0 (HIGH)

CVSSv2 Vector

AV:L/AC:M/Au:N/C:P/I:P/A:P

  • Access Vector: LOCAL
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

3.4

Impact Score

6.4

Weaknesses
  • Type: Primary
    NVD-CWE-noinfo

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application apache tomcat ≤ 7.0.97 Yes
Application apache tomcat ≤ 8.5.47 Yes
Application apache tomcat ≤ 9.0.28 Yes
Operating System debian debian_linux 8.0 Yes
Operating System debian debian_linux 9.0 Yes
Operating System debian debian_linux 10.0 Yes
Application oracle workload_manager 12.2.0.1 Yes
Application oracle workload_manager 18c Yes
Application oracle workload_manager 19c Yes
Operating System canonical ubuntu_linux 16.04 Yes
Operating System opensuse leap 15.1 Yes
Application netapp oncommand_system_manager ≤ 3.1.3 Yes

References