CVE-2019-12418 Affecting tomcat-servlet-4_0-api package, versions <9.0.30-3.34.1
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-SLES150-TOMCATSERVLET40API-2717213
- published 14 Apr 2022
- disclosed 24 Jan 2020
Introduced: 24 Jan 2020
CVE-2019-12418 Open this link in a new tabHow to fix?
Upgrade SLES:15.0
tomcat-servlet-4_0-api
to version 9.0.30-3.34.1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream tomcat-servlet-4_0-api
package and not the tomcat-servlet-4_0-api
package as distributed by SLES
.
See How to fix?
for SLES:15.0
relevant fixed versions and status.
When Apache Tomcat 9.0.0.M1 to 9.0.28, 8.5.0 to 8.5.47, 7.0.0 and 7.0.97 is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files is able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and gain complete control over the Tomcat instance.
References
- https://www.suse.com/security/cve/CVE-2019-12418.html
- https://www.suse.com/support/update/announcement/2020/suse-su-20200226-1.html
- https://www.suse.com/support/update/announcement/2020/suse-su-20200226-1/
- https://bugzilla.suse.com/1139924
- https://bugzilla.suse.com/1159723
- https://bugzilla.suse.com/1159729
- https://bugzilla.suse.com/1161025
- https://www.suse.com/security/cve/CVE-2019-10072/
- https://www.suse.com/security/cve/CVE-2019-12418/
- https://www.suse.com/security/cve/CVE-2019-17563/
- https://www.suse.com/support/security/rating/
- https://lists.apache.org/thread.html/43530b91506e2e0c11cfbe691173f5df8c48f51b98262426d7493b67%40%3Cannounce.tomcat.apache.org%3E
- https://www.debian.org/security/2019/dsa-4596
- https://seclists.org/bugtraq/2019/Dec/43
- https://security.netapp.com/advisory/ntap-20200107-0001/
- https://support.f5.com/csp/article/K10107360?utm_source=f5support&utm_medium=RSS
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00013.html
- https://lists.debian.org/debian-lts-announce/2020/01/msg00024.html
- https://usn.ubuntu.com/4251-1/
- https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
- https://security.gentoo.org/glsa/202003-43
- https://lists.debian.org/debian-lts-announce/2020/03/msg00029.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.debian.org/security/2020/dsa-4680
- https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
- https://support.f5.com/csp/article/K10107360?utm_source=f5support&%3Butm_medium=RSS