CVE-2018-1304
Summary
| CVE | CVE-2018-1304 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-02-28 20:29:00 UTC |
| Updated | 2023-12-08 16:41:00 UTC |
| Description | The URL pattern of "" (the empty string) which exactly maps to the context root was not correctly handled in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 when used as part of a security constraint definition. This caused the constraint to be ignored. It was, therefore, possible for unauthorised users to gain access to web application resources that should have been protected. Only security constraints with a URL pattern of the empty string were affected. |
Risk And Classification
Problem Types: NVD-CWE-noinfo
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Apache | Tomcat | 8.0.0 | rc1 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m1 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m10 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m11 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m12 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m13 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m14 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m15 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m16 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m17 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m18 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m19 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m2 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m20 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m21 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m22 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m23 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m24 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m25 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m26 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m27 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m3 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m4 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m5 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m6 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m7 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m8 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m9 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone1 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone10 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone11 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone12 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone13 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone14 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone15 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone16 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone17 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone18 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone19 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone2 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone20 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone21 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone22 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone23 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone24 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone25 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone26 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone27 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone3 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone4 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone5 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone6 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone7 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone8 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone9 | All | All |
| Application | Apache | Tomcat | 8.0.0 | rc1 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m1 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m10 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m11 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m12 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m13 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m14 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m15 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m16 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m17 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m18 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m19 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m2 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m20 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m21 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m22 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m23 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m24 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m25 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m26 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m27 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m3 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m4 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m5 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m6 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m7 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m8 | All | All |
| Application | Apache | Tomcat | 9.0.0 | m9 | All | All |
| Application | Apache | Tomcat | All | All | All | All |
| Application | Apache | Tomcat | All | All | All | All |
| Application | Apache | Tomcat | All | All | All | All |
| Application | Apache | Tomcat | All | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 14.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 16.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 17.10 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 18.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 14.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 16.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 17.10 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 18.04 | All | All | All |
| Operating System | Debian | Debian Linux | 7.0 | All | All | All |
| Operating System | Debian | Debian Linux | 8.0 | All | All | All |
| Operating System | Debian | Debian Linux | 9.0 | All | All | All |
| Operating System | Debian | Debian Linux | 7.0 | All | All | All |
| Operating System | Debian | Debian Linux | 8.0 | All | All | All |
| Operating System | Debian | Debian Linux | 9.0 | All | All | All |
| Application | Oracle | Fusion Middleware | 12.2.1.3.0 | All | All | All |
| Application | Oracle | Fusion Middleware | 12.2.1.3.0 | All | All | All |
| Application | Oracle | Hospitality Guest Access | 4.2.0 | All | All | All |
| Application | Oracle | Hospitality Guest Access | 4.2.1 | All | All | All |
| Application | Oracle | Hospitality Guest Access | 4.2.0 | All | All | All |
| Application | Oracle | Hospitality Guest Access | 4.2.1 | All | All | All |
| Application | Oracle | Micros Relate Crm Software | 11.4 | All | All | All |
| Application | Oracle | Micros Relate Crm Software | 11.4 | All | All | All |
| Application | Oracle | Secure Global Desktop | 5.3 | All | All | All |
| Application | Oracle | Secure Global Desktop | 5.4 | All | All | All |
| Application | Oracle | Secure Global Desktop | 5.3 | All | All | All |
| Application | Oracle | Secure Global Desktop | 5.4 | All | All | All |
| Operating System | Redhat | Enterprise Linux | 6.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux | 7.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux | 6.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux | 7.0 | All | All | All |
| Application | Redhat | Jboss Enterprise Application Platform | 6 | All | All | All |
| Application | Redhat | Jboss Enterprise Application Platform | 6.4 | All | All | All |
| Application | Redhat | Jboss Enterprise Application Platform | 6 | All | All | All |
| Application | Redhat | Jboss Enterprise Application Platform | 6.4 | All | All | All |
| Application | Redhat | Jboss Enterprise Web Server | 3.0.0 | All | All | All |
| Application | Redhat | Jboss Enterprise Web Server | 3.0.0 | All | All | All |
| Application | Redhat | Jboss Middleware | 1 | All | All | All |
| Application | Redhat | Jboss Middleware | 1 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Pony Mail! | MLIST | lists.apache.org | |
| [SECURITY] [DLA 1301-1] tomcat7 security update | MLIST | lists.debian.org | Issue Tracking, Third Party Advisory |
| Red Hat Customer Portal | REDHAT | access.redhat.com | Third Party Advisory |
| Pony Mail! | lists.apache.org | ||
| Pony Mail! | MLIST | lists.apache.org | Mailing List, Vendor Advisory |
| Apache Mail Archives | lists.apache.org | ||
| Red Hat Customer Portal | REDHAT | access.redhat.com | Third Party Advisory |
| Pony Mail! | MLIST | lists.apache.org | Mailing List, Third Party Advisory |
| Pony Mail! | lists.apache.org | ||
| Pony Mail! | MLIST | lists.apache.org | |
| Pony Mail! | lists.apache.org | ||
| Red Hat Customer Portal | REDHAT | access.redhat.com | Third Party Advisory |
| Apache Tomcat URL Pattern Processing Error Lets Remote Users Bypass Certain Security Constraints on the Target System - SecurityTracker | SECTRACK | www.securitytracker.com | Third Party Advisory, VDB Entry |
| Pony Mail! | MLIST | lists.apache.org | Mailing List, Vendor Advisory |
| Pony Mail! | lists.apache.org | ||
| Red Hat Customer Portal | REDHAT | access.redhat.com | |
| Red Hat Customer Portal | REDHAT | access.redhat.com | Third Party Advisory |
| Pony Mail! | MLIST | lists.apache.org | Mailing List, Vendor Advisory |
| [SECURITY] [DLA 1400-1] tomcat7 security update | MLIST | lists.debian.org | Mailing List, Third Party Advisory |
| CPU July 2018 | CONFIRM | www.oracle.com | Patch, Third Party Advisory |
| Pony Mail! | lists.apache.org | ||
| Pony Mail! | lists.apache.org | ||
| Pony Mail! | MLIST | lists.apache.org | |
| Pony Mail! | MLIST | lists.apache.org | Mailing List, Third Party Advisory |
| Pony Mail! | lists.apache.org | ||
| Red Hat Customer Portal | REDHAT | access.redhat.com | Third Party Advisory |
| Pony Mail! | lists.apache.org | ||
| [SECURITY] [DLA 1450-1] tomcat8 security update | MLIST | lists.debian.org | Mailing List, Third Party Advisory |
| Pony Mail! | lists.apache.org | ||
| Apache Mail Archives | MISC | lists.apache.org | Mailing List, Vendor Advisory |
| Red Hat Customer Portal | REDHAT | access.redhat.com | Third Party Advisory |
| Pony Mail! | MLIST | lists.apache.org | Mailing List, Third Party Advisory |
| Red Hat Customer Portal | REDHAT | access.redhat.com | Third Party Advisory |
| Pony Mail! | lists.apache.org | ||
| Pony Mail! | MLIST | lists.apache.org | |
| Apache Tomcat CVE-2018-1304 Security Bypass Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| Pony Mail! | MLIST | lists.apache.org | Mailing List, Third Party Advisory |
| Pony Mail! | lists.apache.org | ||
| Pony Mail! | MLIST | lists.apache.org | Mailing List, Vendor Advisory |
| USN-3665-1: Tomcat vulnerabilities | Ubuntu security notices | UBUNTU | usn.ubuntu.com | Third Party Advisory |
| Oracle Critical Patch Update - July 2019 | MISC | www.oracle.com | |
| Pony Mail! | lists.apache.org | ||
| Pony Mail! | lists.apache.org | ||
| CPU Oct 2018 | CONFIRM | www.oracle.com | Patch, Third Party Advisory |
| Pony Mail! | lists.apache.org | ||
| Pony Mail! | MLIST | lists.apache.org | |
| Pony Mail! | MLIST | lists.apache.org | Mailing List, Third Party Advisory |
| Oracle Critical Patch Update Advisory - April 2020 | N/A | www.oracle.com | |
| Red Hat Customer Portal | REDHAT | access.redhat.com | Third Party Advisory |
| Red Hat Customer Portal | REDHAT | access.redhat.com | Third Party Advisory |
| February 2018 Apache Tomcat Vulnerabilities in NetApp Products | NetApp Product Security | CONFIRM | security.netapp.com | Patch, Third Party Advisory |
| Pony Mail! | lists.apache.org | ||
| Pony Mail! | MLIST | lists.apache.org | Mailing List, Vendor Advisory |
| Pony Mail! | lists.apache.org | ||
| Debian -- Security Information -- DSA-4281-1 tomcat8 | DEBIAN | www.debian.org | Third Party Advisory |
| Pony Mail! | MLIST | lists.apache.org | Mailing List, Third Party Advisory |
| Oracle Critical Patch Update Advisory - April 2019 | MISC | www.oracle.com | Patch, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.