Server-side Request Forgery (SSRF) Affecting tomcat package, versions [,5.2.0)


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.25% (65th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-TOMCAT-2382331
  • published26 Jan 2022
  • disclosed28 May 2019
  • creditUnknown

Introduced: 28 May 2019

CVE-2018-17198  (opens in a new tab)
CWE-918  (opens in a new tab)

How to fix?

Upgrade tomcat to version 5.2.0 or higher.

Overview

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF). Server-side Request Forgery (SSRF) and File Enumeration vulnerability in Apache Roller 5.2.1, 5.2.0 and earlier unsupported versions relies on Java SAX Parser to implement its XML-RPC interface and by default that parser supports external entities in XML DOCTYPE, which opens Roller up to SSRF / File Enumeration vulnerability. Note that this vulnerability exists even if Roller XML-RPC interface is disable via the Roller web admin UI. Mitigation: There are a couple of ways you can fix this vulnerability: 1) Upgrade to the latest version of Roller, which is now 5.2.2 2) Or, edit the Roller web.xml file and comment out the XML-RPC Servlet mapping as shown below:

CVSS Scores

version 3.1