Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1mZzQ0LXczZnItaGd4ds4AAUG8
Apache TomEE console vulnerable to Cross-site Scripting
The Apache TomEE console (tomee-webapp) has a XSS vulnerability which could allow javascript to be executed if the user is given a malicious URL. This web application is typically used to add TomEE features to a Tomcat installation. The TomEE bundles do not ship with this application included. This issue can be mitigated by removing the application after TomEE is setup (if using the application to install TomEE), using one of the provided pre-configured bundles, or by upgrading to TomEE 7.0.5. This issue is resolved in this commit: b8bbf50c23ce97dd64f3a5d77f78f84e47579863.
Permalink: https://github.com/advisories/GHSA-fg44-w3fr-hgxvJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1mZzQ0LXczZnItaGd4ds4AAUG8
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 2 years ago
Updated: almost 2 years ago
CVSS Score: 6.1
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
EPSS Percentage: 0.00188
EPSS Percentile: 0.57516
Identifiers: GHSA-fg44-w3fr-hgxv, CVE-2018-8031
References:
- https://nvd.nist.gov/vuln/detail/CVE-2018-8031
- https://lists.apache.org/thread.html/c4b0d83a534d6cdf2de54dbbd00e3538072ac2e360781b784608ed0d@%3Cdev.tomee.apache.org%3E
- https://github.com/apache/tomee/commit/b8bbf50c23ce97dd64f3a5d77f78f84e47579863
- https://github.com/advisories/GHSA-fg44-w3fr-hgxv
Blast Radius: 6.1
Affected Packages
maven:org.apache.tomee:tomee-webapp
Dependent packages: 9Dependent repositories: 10
Downloads:
Affected Version Ranges: < 7.0.5
Fixed in: 7.0.5
All affected versions: 7.0.0, 7.0.1, 7.0.2, 7.0.3, 7.0.4
All unaffected versions: 7.0.5, 7.0.6, 7.0.7, 7.0.8, 7.0.9, 7.1.0, 7.1.1, 7.1.2, 7.1.3, 7.1.4, 8.0.0, 8.0.1, 8.0.2, 8.0.3, 8.0.4, 8.0.5, 8.0.6, 8.0.7, 8.0.8, 8.0.9, 8.0.10, 8.0.11, 8.0.12, 8.0.13, 8.0.14, 8.0.15, 8.0.16, 9.0.0, 9.1.0, 9.1.1, 9.1.2, 9.1.3