Shaofeng SHI created KYLIN-3611: ----------------------------------- Summary: Upgrade Tomcat to 7.0.91, 8.5.34 or later Key: KYLIN-3611 URL: https://issues.apache.org/jira/browse/KYLIN-3611 Project: Kylin Issue Type: Improvement Reporter: Shaofeng SHI
h2. [SECURITY] CVE-2018-11784 Apache Tomcat - Open Redirect CVE-2018-11784 Apache Tomcat - Open Redirect Severity: Moderate Vendor: The Apache Software Foundation Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.11 Apache Tomcat 8.5.0 to 8.5.33 Apache Tomcat 7.0.23 to 7.0.90 The unsupported 8.0.x release line has not been analysed but is likely to be affected. Description: When the default servlet returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice. Mitigation: Users of the affected versions should apply one of the following mitigations: - Upgrade to Apache Tomcat 9.0.12 or later. - Upgrade to Apache Tomcat 8.5.34 or later. - Upgrade to Apache Tomcat 7.0.91 or later. - Use mapperDirectoryRedirectEnabled="true" and mapperContextRootRedirectEnabled="true" on the Context to ensure that redirects are issued by the Mapper rather than the default Servlet. See the Context configuration documentation for further important details. Credit: This vulnerability was found by Sergey Bobrov and reported responsibly to the Apache Tomcat Security Team. History: 2018-10-03 Original advisory References: [1] [http://tomcat.apache.org/security-9.html] [2] [http://tomcat.apache.org/security-8.html] [3] [http://tomcat.apache.org/security-7.html] -- This message was sent by Atlassian JIRA (v7.6.3#76005)