CVE-2019-12418 Affecting tomcat-el-3_0-api package, versions <9.0.30-3.34.1
Snyk CVSS
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-SLES150-TOMCATEL30API-2717157
- published 14 Apr 2022
- disclosed 24 Jan 2020
Introduced: 24 Jan 2020
CVE-2019-12418 Open this link in a new tabHow to fix?
Upgrade SLES:15.0
tomcat-el-3_0-api
to version 9.0.30-3.34.1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream tomcat-el-3_0-api
package and not the tomcat-el-3_0-api
package as distributed by SLES:15.0
.
See How to fix?
for SLES:15.0
relevant fixed versions and status.
When Apache Tomcat 9.0.0.M1 to 9.0.28, 8.5.0 to 8.5.47, 7.0.0 and 7.0.97 is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files is able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and gain complete control over the Tomcat instance.
References
- CVE-2019-12418
- E-Mail link for SUSE-SU-2020:0226-1
- Link for SUSE-SU-2020:0226-1
- SUSE Bug 1139924
- SUSE Bug 1159723
- SUSE Bug 1159729
- SUSE Bug 1161025
- SUSE CVE CVE-2019-10072 page
- SUSE CVE CVE-2019-12418 page
- SUSE CVE CVE-2019-17563 page
- SUSE Security Ratings
- security@apache.org
- security@apache.org
- security@apache.org
- security@apache.org
- security@apache.org
- security@apache.org
- security@apache.org
- security@apache.org
- security@apache.org
- security@apache.org
- security@apache.org
- security@apache.org
- security@apache.org
- security@apache.org
- security@apache.org
- security@apache.org
- security@apache.org