Privilege Escalation

Affecting org.apache.tomcat.embed:tomcat-embed-core artifact, versions [9.0.0.M1, 9.0.29) || [8.5.0, 8.5.49) || [,7.0.99)

Report new vulnerabilities
Do your applications use this vulnerable package? Test your applications

Overview

org.apache.tomcat.embed:tomcat-embed-core is a Core Tomcat implementation.

Affected versions of this package are vulnerable to Privilege Escalation. When Tomcat is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files is able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and gain complete control over the Tomcat instance.

Remediation

Upgrade org.apache.tomcat.embed:tomcat-embed-core to version 9.0.29, 8.5.49, 7.0.99 or higher.

References

CVSS Score

7.8
high severity
  • Attack Vector
    Local
  • Attack Complexity
    Low
  • Privileges Required
    Low
  • User Interaction
    None
  • Scope
    Unchanged
  • Confidentiality
    High
  • Integrity
    High
  • Availability
    High
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Credit
An Trinh of Viettel Cyber Security
CVE
CVE-2019-12418
CWE
CWE-264
Snyk ID
SNYK-JAVA-ORGAPACHETOMCATEMBED-538490
Disclosed
18 Dec, 2019
Published
20 Dec, 2019