Uploaded image for project: 'OFBiz'
  1. OFBiz
  2. OFBIZ-1525 Issue to group security concerns
  3. OFBIZ-10920

Update Tomcat to 9.0.18 due to CVE-2019-0232

    XMLWordPrintableJSON

    Details

    • Type: Sub-task
    • Status: Closed
    • Priority: Major
    • Resolution: Fixed
    • Affects Version/s: Trunk, Release Branch 16.11, Release Branch 17.12, Release Branch 18.12
    • Fix Version/s: 17.12.01, 16.11.06, 18.12.01
    • Component/s: framework
    • Labels:
      None
    • Sprint:
      Bug Crush Event - 21/2/2015

      Description

      CVE-2019-0232 Apache Tomcat Remote Code Execution on Windows

      Severity: Important

      Vendor: The Apache Software Foundation

      Versions Affected:
      Apache Tomcat 9.0.0.M1 to 9.0.17
      Apache Tomcat 8.5.0 to 8.5.39
      Apache Tomcat 7.0.0 to 7.0.93

      Description:
      When running on Windows with enableCmdLineArguments enabled, the CGI
      Servlet is vulnerable to Remote Code Execution due to a bug in the way
      the JRE passes command line arguments to Windows. The CGI Servlet is
      disabled by default. The CGI option enableCmdLineArguments is disabled
      by default in Tomcat 9.0.x (and will be disabled by default in all
      versions in response to this vulnerability). For a detailed explanation
      of the JRE behaviour, see Markus Wulftange's blog [1] and this archived
      MSDN blog [2].

      Mitigation:
      Users of affected versions should apply one of the following mitigations:

      • Ensure the CGI Servlet initialisation parameter enableCmdLineArguments
        is set to false
      • Upgrade to Apache Tomcat 9.0.18 or later when released
      • Upgrade to Apache Tomcat 8.5.40 or later when released
      • Upgrade to Apache Tomcat 7.0.93 or later when released
        This announcement is being made before the releases are available as the
        change to fix this issue is obviously security related.

      Credit:
      This issue was identified by an external security researcher and
      reported to the Apache Tomcat security team via the bug bounty program
      sponsored by the EU FOSSA-2 project.

        Attachments

          Activity

            People

            • Assignee:
              jacques.le.roux Jacques Le Roux
              Reporter:
              jacques.le.roux Jacques Le Roux
            • Votes:
              0 Vote for this issue
              Watchers:
              1 Start watching this issue

              Dates

              • Created:
                Updated:
                Resolved: