Insufficient Hostname Verification Affecting org.apache.tomcat:tomcat-websocket Open this link in a new tab package, versions [8.0.0-RC1,8.0.53) [8.5.0,8.5.32) [9.0.0.M1,9.0.10)
Attack Complexity
Low
Confidentiality
High
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications-
snyk-id
SNYK-JAVA-ORGAPACHETOMCAT-1023362
-
published
24 Jul 2018
-
disclosed
22 Jul 2018
-
credit
Unknown
Introduced: 22 Jul 2018
CVE-2018-8034 Open this link in a new tabOverview
org.apache.tomcat:tomcat.websocket is an open source implementation of the Java Servlet, JavaServer Pages, Java Expression Language and Java WebSocket technologies.
Affected versions of this package are vulnerable to Insufficient Hostname Verification. It did not verify if the hostname in the TLS
certificate and the actual hostname of the remote host matched.
Remediation
Upgrade org.apache.tomcat:tomcat.websocket
to versions 7.0.90, 8.0.53,8.5.32, 9.0.10 or higher.