CVE-2018-11784

Source
https://cve.org/CVERecord?id=CVE-2018-11784
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-11784.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2018-11784
Aliases
Downstream
Related
Published
2018-10-04T13:29:00.330Z
Modified
2026-05-15T12:03:10.276239184Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N CVSS Calculator
Summary
[none]
Details

When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice.

Database specific
{
    "unresolved_ranges": [
        {
            "cpes": [
                "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
            ],
            "source": "CPE_FIELD",
            "vendor_product": "canonical:ubuntu_linux",
            "extracted_events": [
                {
                    "last_affected": "14.04"
                },
                {
                    "last_affected": "16.04"
                }
            ]
        },
        {
            "cpes": [
                "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
            ],
            "source": "CPE_FIELD",
            "vendor_product": "debian:debian_linux",
            "extracted_events": [
                {
                    "last_affected": "8.0"
                }
            ]
        },
        {
            "cpes": [
                "cpe:2.3:a:oracle:communications_application_session_controller:3.7.1:*:*:*:*:*:*:*",
                "cpe:2.3:a:oracle:communications_application_session_controller:3.8.0:*:*:*:*:*:*:*"
            ],
            "source": "CPE_FIELD",
            "vendor_product": "oracle:communications_application_session_controller",
            "extracted_events": [
                {
                    "last_affected": "3.7.1"
                },
                {
                    "last_affected": "3.8.0"
                }
            ]
        },
        {
            "cpes": [
                "cpe:2.3:a:oracle:hospitality_guest_access:4.2.0:*:*:*:*:*:*:*",
                "cpe:2.3:a:oracle:hospitality_guest_access:4.2.1:*:*:*:*:*:*:*"
            ],
            "source": "CPE_FIELD",
            "vendor_product": "oracle:hospitality_guest_access",
            "extracted_events": [
                {
                    "last_affected": "4.2.0"
                },
                {
                    "last_affected": "4.2.1"
                }
            ]
        },
        {
            "cpes": [
                "cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*",
                "cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*",
                "cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*"
            ],
            "source": "CPE_FIELD",
            "vendor_product": "oracle:instantis_enterprisetrack",
            "extracted_events": [
                {
                    "last_affected": "17.1"
                },
                {
                    "last_affected": "17.2"
                },
                {
                    "last_affected": "17.3"
                }
            ]
        },
        {
            "cpes": [
                "cpe:2.3:a:oracle:retail_order_broker:15.0:*:*:*:*:*:*:*",
                "cpe:2.3:a:oracle:retail_order_broker:5.1:*:*:*:*:*:*:*",
                "cpe:2.3:a:oracle:retail_order_broker:5.2:*:*:*:*:*:*:*"
            ],
            "source": "CPE_FIELD",
            "vendor_product": "oracle:retail_order_broker",
            "extracted_events": [
                {
                    "last_affected": "5.1"
                },
                {
                    "last_affected": "5.2"
                },
                {
                    "last_affected": "15.0"
                }
            ]
        },
        {
            "cpes": [
                "cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*"
            ],
            "source": "CPE_FIELD",
            "vendor_product": "oracle:secure_global_desktop",
            "extracted_events": [
                {
                    "last_affected": "5.4"
                }
            ]
        },
        {
            "cpes": [
                "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
            ],
            "vendor_product": "redhat:enterprise_linux_desktop",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "7.0"
                }
            ]
        },
        {
            "cpes": [
                "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                "cpe:2.3:o:redhat:enterprise_linux_server:7.6:*:*:*:*:*:*:*"
            ],
            "source": "CPE_FIELD",
            "vendor_product": "redhat:enterprise_linux_server",
            "extracted_events": [
                {
                    "last_affected": "7.0"
                },
                {
                    "last_affected": "7.6"
                }
            ]
        },
        {
            "cpes": [
                "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
            ],
            "vendor_product": "redhat:enterprise_linux_server_aus",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "7.6"
                }
            ]
        },
        {
            "cpes": [
                "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"
            ],
            "source": "CPE_FIELD",
            "vendor_product": "redhat:enterprise_linux_server_eus",
            "extracted_events": [
                {
                    "last_affected": "7.6"
                }
            ]
        },
        {
            "cpes": [
                "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
            ],
            "source": "CPE_FIELD",
            "vendor_product": "redhat:enterprise_linux_server_tus",
            "extracted_events": [
                {
                    "last_affected": "7.6"
                }
            ]
        },
        {
            "cpes": [
                "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
            ],
            "source": "CPE_FIELD",
            "vendor_product": "redhat:enterprise_linux_workstation",
            "extracted_events": [
                {
                    "last_affected": "7.0"
                }
            ]
        }
    ]
}
References

Affected packages