Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1mZzQ0LXczZnItaGd4ds4AAUG8

Apache TomEE console vulnerable to Cross-site Scripting

The Apache TomEE console (tomee-webapp) has a XSS vulnerability which could allow javascript to be executed if the user is given a malicious URL. This web application is typically used to add TomEE features to a Tomcat installation. The TomEE bundles do not ship with this application included. This issue can be mitigated by removing the application after TomEE is setup (if using the application to install TomEE), using one of the provided pre-configured bundles, or by upgrading to TomEE 7.0.5. This issue is resolved in this commit: b8bbf50c23ce97dd64f3a5d77f78f84e47579863.

Permalink: https://github.com/advisories/GHSA-fg44-w3fr-hgxv
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1mZzQ0LXczZnItaGd4ds4AAUG8
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 2 years ago
Updated: over 1 year ago


CVSS Score: 6.1
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Identifiers: GHSA-fg44-w3fr-hgxv, CVE-2018-8031
References: Repository: https://github.com/apache/tomee
Blast Radius: 6.1

Affected Packages

maven:org.apache.tomee:tomee-webapp
Dependent packages: 9
Dependent repositories: 10
Downloads:
Affected Version Ranges: < 7.0.5
Fixed in: 7.0.5
All affected versions: 7.0.0, 7.0.1, 7.0.2, 7.0.3, 7.0.4
All unaffected versions: 7.0.5, 7.0.6, 7.0.7, 7.0.8, 7.0.9, 7.1.0, 7.1.1, 7.1.2, 7.1.3, 7.1.4, 8.0.0, 8.0.1, 8.0.2, 8.0.3, 8.0.4, 8.0.5, 8.0.6, 8.0.7, 8.0.8, 8.0.9, 8.0.10, 8.0.11, 8.0.12, 8.0.13, 8.0.14, 8.0.15, 8.0.16, 9.0.0, 9.1.0, 9.1.1, 9.1.2