Insufficient Hostname Verification Affecting org.apache.tomcat:tomcat-websocket Open this link in a new tab package, versions [8.0.0-RC1,8.0.53) [8.5.0,8.5.32) [9.0.0.M1,9.0.10)


0.0
high
  • Attack Complexity

    Low

  • Confidentiality

    High

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-JAVA-ORGAPACHETOMCAT-1023362

  • published

    24 Jul 2018

  • disclosed

    22 Jul 2018

  • credit

    Unknown

Overview

org.apache.tomcat:tomcat.websocket is an open source implementation of the Java Servlet, JavaServer Pages, Java Expression Language and Java WebSocket technologies.

Affected versions of this package are vulnerable to Insufficient Hostname Verification. It did not verify if the hostname in the TLS certificate and the actual hostname of the remote host matched.

Remediation

Upgrade org.apache.tomcat:tomcat.websocket to versions 7.0.90, 8.0.53,8.5.32, 9.0.10 or higher.