Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2018-11784
Severity
4.3MEDIUM
EPSS
82.6%
top 0.77%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedOct 4
Latest updateMar 18
Description
When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice.
CVSS vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:NExploitability: 2.8 | Impact: 1.4
Affected Packages13 packages
▶CVEListV5apache_software_foundation/apache_tomcat7.0.23 to 7.0.90, 8.5.0 to 8.5.33, 9.0.0.M1 to 9.0.11+2
Also affects: Debian Linux 8.0, Ubuntu Linux 14.04, 16.04, Enterprise Linux 7.6
Patches
🔴Vulnerability Details
5💥Exploits & PoCs
2Nuclei▶
Apache Tomcat - Open Redirect