Remote Code Execution Affecting org.apache.tomcat:tomcat-catalina Open this link in a new tab package, versions [7.0.0,7.0.94) [8.5.0,8.5.40) [9.0.0.M1,9.0.18)
Do your applications use this vulnerable package?
17 Apr 2019
15 Apr 2019
How to fix?
org.apache.tomcat:tomcat-catalina to version 7.0.94, 8.5.40, 9.0.18 or higher.
org.apache.tomcat:tomcat-catalina is a Tomcat Servlet Engine Core Classes and Standard implementations.
Affected versions of this package are vulnerable to Remote Code Execution due to a bug in the way the underlying Java Runtime Environment (JRE) passes command line arguments to windows systems when the option
enableCmdLineArguments is enabled.
The CGI Servlet in Apache Tomcat when enabled, will pass user input to the underlying operating system for command line parsing. However, this process is not consistent and may allow the injection of additional arguments. This misconfiguration could be abused by attackers to execute code on an application's underlying operating system.