Your submission was sent successfully! Close

CVE-2019-12418

Published: 23 December 2019

When Apache Tomcat 9.0.0.M1 to 9.0.28, 8.5.0 to 8.5.47, 7.0.0 and 7.0.97 is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files is able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and gain complete control over the Tomcat instance.

Priority

Medium

CVSS 3 base score: 7.0

Status

Package Release Status
tomcat7
Launchpad, Ubuntu, Debian
bionic Needs triage

disco Does not exist

eoan Does not exist

focal Does not exist

groovy Does not exist

hirsute Does not exist

impish Does not exist

jammy Does not exist

precise Does not exist

trusty Needs triage

upstream Needs triage

xenial Ignored
(end of standard support, was needs-triage)
tomcat8
Launchpad, Ubuntu, Debian
bionic Needs triage

disco Does not exist

eoan Does not exist

focal Does not exist

groovy Does not exist

hirsute Does not exist

impish Does not exist

jammy Does not exist

precise Does not exist

trusty Does not exist

upstream Needs triage

xenial
Released (8.0.32-1ubuntu1.11)
tomcat9
Launchpad, Ubuntu, Debian
bionic Needs triage

disco Ignored
(reached end-of-life)
eoan Ignored
(reached end-of-life)
focal Not vulnerable
(9.0.31-1)
groovy Not vulnerable
(9.0.31-1)
hirsute Not vulnerable
(9.0.31-1)
impish Not vulnerable
(9.0.31-1)
jammy Not vulnerable
(9.0.31-1)
precise Does not exist

trusty Does not exist

upstream Needs triage

xenial Does not exist