Vulnerabilities > CVE-2018-8034 - Improper Certificate Validation vulnerability in multiple products

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
HIGH
Integrity impact
NONE
Availability impact
NONE
network
low complexity
apache
debian
canonical
oracle
CWE-295
nessus

Summary

The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88.

Vulnerable Configurations

Part Description Count
Application
Apache
184
Application
Oracle
3
OS
Debian
2
OS
Canonical
2

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Creating a Rogue Certificate Authority Certificate
    An attacker exploits a weakness in the MD5 hash algorithm (weak collision resistance) to generate a certificate signing request (CSR) that contains collision blocks in the "to be signed" part. The attacker specially crafts two different, but valid X.509 certificates that when hashed with the MD5 algorithm would yield the same value. The attacker then sends the CSR for one of the certificates to the Certification Authority which uses the MD5 hashing algorithm. That request is completely valid and the Certificate Authority issues an X.509 certificate to the attacker which is signed with its private key. An attacker then takes that signed blob and inserts it into another X.509 certificate that the attacker generated. Due to the MD5 collision, both certificates, though different, hash to the same value and so the signed blob works just as well in the second certificate. The net effect is that the attackers' second X.509 certificate, which the Certification Authority has never seen, is now signed and validated by that Certification Authority. To make the attack more interesting, the second certificate could be not just a regular certificate, but rather itself a signing certificate. Thus the attacker is able to start their own Certification Authority that is anchored in its root of trust in the legitimate Certification Authority that has signed the attackers' first X.509 certificate. If the original Certificate Authority was accepted by default by browsers, so will now the Certificate Authority set up by the attacker and of course any certificates that it signs. So the attacker is now able to generate any SSL certificates to impersonate any web server, and the user's browser will not issue any warning to the victim. This can be used to compromise HTTPS communications and other types of systems where PKI and X.509 certificates may be used (e.g., VPN, IPSec) .

Nessus

  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20190806_TOMCAT_ON_SL7_X.NASL
    descriptionSecurity Fix(es) : - tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources (CVE-2018-1304) - tomcat: Late application of security constraints can lead to resource exposure for unauthorised users (CVE-2018-1305) - tomcat: Insecure defaults in CORS filter enable
    last seen2020-03-18
    modified2019-08-27
    plugin id128266
    published2019-08-27
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/128266
    titleScientific Linux Security Update : tomcat on SL7.x x86_64 (20190806)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text is (C) Scientific Linux.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(128266);
      script_version("1.3");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/02/24");
    
      script_cve_id("CVE-2018-1304", "CVE-2018-1305", "CVE-2018-8014", "CVE-2018-8034");
    
      script_name(english:"Scientific Linux Security Update : tomcat on SL7.x x86_64 (20190806)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Scientific Linux host is missing one or more security
    updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Security Fix(es) :
    
      - tomcat: Incorrect handling of empty string URL in
        security constraints can lead to unintended exposure of
        resources (CVE-2018-1304)
    
      - tomcat: Late application of security constraints can
        lead to resource exposure for unauthorised users
        (CVE-2018-1305)
    
      - tomcat: Insecure defaults in CORS filter enable
        'supportsCredentials' for all origins (CVE-2018-8014)
    
      - tomcat: Host name verification missing in WebSocket
        client (CVE-2018-8034)"
      );
      # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1908&L=SCIENTIFIC-LINUX-ERRATA&P=24724
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?2aa9ccdd"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:tomcat");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:tomcat-admin-webapps");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:tomcat-docs-webapp");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:tomcat-el-2.2-api");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:tomcat-javadoc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:tomcat-jsp-2.2-api");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:tomcat-jsvc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:tomcat-lib");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:tomcat-servlet-3.0-api");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:tomcat-webapps");
      script_set_attribute(attribute:"cpe", value:"x-cpe:/o:fermilab:scientific_linux");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2018/02/23");
      script_set_attribute(attribute:"patch_publication_date", value:"2019/08/06");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/08/27");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Scientific Linux Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Scientific Linux " >!< release) audit(AUDIT_HOST_NOT, "running Scientific Linux");
    os_ver = pregmatch(pattern: "Scientific Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Scientific Linux");
    os_ver = os_ver[1];
    if (! preg(pattern:"^7([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Scientific Linux 7.x", "Scientific Linux " + os_ver);
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu >!< "x86_64" && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Scientific Linux", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"SL7", reference:"tomcat-7.0.76-9.el7")) flag++;
    if (rpm_check(release:"SL7", cpu:"x86_64", reference:"tomcat-7.0.76-9.el7")) flag++;
    if (rpm_check(release:"SL7", reference:"tomcat-admin-webapps-7.0.76-9.el7")) flag++;
    if (rpm_check(release:"SL7", cpu:"x86_64", reference:"tomcat-admin-webapps-7.0.76-9.el7")) flag++;
    if (rpm_check(release:"SL7", reference:"tomcat-docs-webapp-7.0.76-9.el7")) flag++;
    if (rpm_check(release:"SL7", cpu:"x86_64", reference:"tomcat-docs-webapp-7.0.76-9.el7")) flag++;
    if (rpm_check(release:"SL7", reference:"tomcat-el-2.2-api-7.0.76-9.el7")) flag++;
    if (rpm_check(release:"SL7", cpu:"x86_64", reference:"tomcat-el-2.2-api-7.0.76-9.el7")) flag++;
    if (rpm_check(release:"SL7", reference:"tomcat-javadoc-7.0.76-9.el7")) flag++;
    if (rpm_check(release:"SL7", cpu:"x86_64", reference:"tomcat-javadoc-7.0.76-9.el7")) flag++;
    if (rpm_check(release:"SL7", reference:"tomcat-jsp-2.2-api-7.0.76-9.el7")) flag++;
    if (rpm_check(release:"SL7", cpu:"x86_64", reference:"tomcat-jsp-2.2-api-7.0.76-9.el7")) flag++;
    if (rpm_check(release:"SL7", reference:"tomcat-jsvc-7.0.76-9.el7")) flag++;
    if (rpm_check(release:"SL7", cpu:"x86_64", reference:"tomcat-jsvc-7.0.76-9.el7")) flag++;
    if (rpm_check(release:"SL7", reference:"tomcat-lib-7.0.76-9.el7")) flag++;
    if (rpm_check(release:"SL7", cpu:"x86_64", reference:"tomcat-lib-7.0.76-9.el7")) flag++;
    if (rpm_check(release:"SL7", reference:"tomcat-servlet-3.0-api-7.0.76-9.el7")) flag++;
    if (rpm_check(release:"SL7", cpu:"x86_64", reference:"tomcat-servlet-3.0-api-7.0.76-9.el7")) flag++;
    if (rpm_check(release:"SL7", reference:"tomcat-webapps-7.0.76-9.el7")) flag++;
    if (rpm_check(release:"SL7", cpu:"x86_64", reference:"tomcat-webapps-7.0.76-9.el7")) flag++;
    
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_HOLE,
        extra      : rpm_report_get()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "tomcat / tomcat-admin-webapps / tomcat-docs-webapp / etc");
    }
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2019-1529.NASL
    descriptionAn update for the pki-deps:10.6 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The Public Key Infrastructure (PKI) Deps module contains fundamental packages required as dependencies for the pki-core module by Red Hat Certificate System. Security Fix(es) : * tomcat: Due to a mishandling of close in NIO/NIO2 connectors user sessions can get mixed up (CVE-2018-8037) * tomcat: Insecure defaults in CORS filter enable
    last seen2020-05-23
    modified2019-06-19
    plugin id126030
    published2019-06-19
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126030
    titleRHEL 8 : pki-deps:10.6 (RHSA-2019:1529)
  • NASL familyWeb Servers
    NASL idTOMCAT_8_5_32.NASL
    descriptionThe version of Apache Tomcat installed on the remote host is 8.5.x prior to 8.5.32. It is, therefore, affected by multiple vulnerabilities.
    last seen2020-03-18
    modified2018-07-13
    plugin id111068
    published2018-07-13
    reporterThis script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/111068
    titleApache Tomcat 8.5.0 < 8.5.32 Multiple Vulnerabilities
  • NASL familyMisc.
    NASL idSYMANTEC_CONTENT_ANALYSIS_SYMSA1463.NASL
    descriptionThe version of Symantec Content Analysis running on the remote host is prior to version 2.3.5.1. It is, therefore, affected by multiple vulnerabilities: - An improper handing of overflow in the UTF-8 decoder with supplementary characters can lead to an infinite loop in the decoder causing a Denial of Service. (CVE-2018-1336) - When using an OCSP responder Apache Tomcat Native 1.2.0 to 1.2.16 and 1.1.23 to 1.1.34 did not correctly handle invalid responses. This allowed for revoked client certificates to be incorrectly identified. It was therefore possible for users to authenticate with revoked certificates when using mutual TLS.(CVE-2018-8019) - Apache Tomcat Native 1.2.0 to 1.2.16 and 1.1.23 to 1.1.34 has a flaw that does not properly check OCSP pre-produced responses, which are lists (multiple entries) of certificate statuses. (CVE-2018-8020) - The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. (CVE-2018-8034)
    last seen2020-06-01
    modified2020-06-02
    plugin id125550
    published2019-05-30
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125550
    titleSymantec Content Analysis < 2.3.5.1 affected by Multiple Vulnerabilities (SYMSA1463)
  • NASL familyCGI abuses
    NASL idORACLE_PRIMAVERA_UNIFIER_CPU_APR_2019.NASL
    descriptionAccording to its self-reported version number, the Oracle Primavera Unifier installation running on the remote web server is 16.x prior to 16.2.15.7 or 17.7.x prior to 17.12.10 or 18.x prior to 18.8.6. It is, therefore, affected by multiple vulnerabilities: - A deserialization vulnerability in Apache Commons FileUpload allows for remote code execution. (CVE-2016-1000031) - A denial of service (DoS) vulnerability exists in Apache HTTP Server 2.4.17 to 2.4.34, due to a design error. An unauthenticated, remote attacker can exploit this issue by sending continuous, large SETTINGS frames to cause a client to occupy a connection, server thread and CPU time without any connection timeout coming to effect. This affects only HTTP/2 connections. A possible mitigation is to not enable the h2 protocol. (CVE-2018-11763). - A deserialization vulnerability in jackson-databind, a fast and powerful JSON library for Java, allows an unauthenticated user to perform code execution. The issue was resolved by extending the blacklist and blocking more classes from polymorphic deserialization. (CVE-2018-19362) Note that Nessus has not tested for these issues but has instead relied only on the application
    last seen2020-06-01
    modified2020-06-02
    plugin id124170
    published2019-04-19
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/124170
    titleOracle Primavera Unifier Multiple Vulnerabilities (Apr 2019 CPU)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2018-1129.NASL
    descriptionThis update for tomcat to version 9.0.10 fixes the following issues : Security issues fixed : - CVE-2018-1336: An improper handing of overflow in the UTF-8 decoder with supplementary characters could have lead to an infinite loop in the decoder causing a Denial of Service (bsc#1102400). - CVE-2018-8014: Fix insecure default CORS filter settings (bsc#1093697). - CVE-2018-8034: The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default (bsc#1102379). - CVE-2018-8037: If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could have resulted in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also have resulted in a user seeing a response intended for another user (bsc#1102410). Bug fixes : - Avoid overwriting of customer
    last seen2020-06-05
    modified2018-10-09
    plugin id117983
    published2018-10-09
    reporterThis script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/117983
    titleopenSUSE Security Update : tomcat (openSUSE-2018-1129)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2018-1019.NASL
    descriptionThis update for tomcat to 8.0.53 fixes the following issues : Security issue fixed : - CVE-2018-1336: An improper handing of overflow in the UTF-8 decoder with supplementary characters could have lead to an infinite loop in the decoder causing a Denial of Service (bsc#1102400). - CVE-2018-8034: The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default (bsc#1102379). - CVE-2018-8037: If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could have resulted in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also have resulted in a user seeing a response intended for another user (bsc#1102410). - CVE-2018-8014: Fix insecure default CORS filter settings (bsc#1093697). Bug fixes : - bsc#1067720: Avoid overwriting of customer
    last seen2020-06-05
    modified2018-09-17
    plugin id117526
    published2018-09-17
    reporterThis script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/117526
    titleopenSUSE Security Update : tomcat (openSUSE-2018-1019)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2019-1160.NASL
    descriptionAn update is now available for Red Hat JBoss Enterprise Application Platform 6.4 for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 6.4.22 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.21, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix(es) : * admin-cli: wildfly-core: Cross-site scripting (XSS) in JBoss Management Console (CVE-2018-10934) * dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents (CVE-2018-1000632) * jbossweb: tomcat: host name verification missing in WebSocket client (CVE-2018-8034) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. All users of Red Hat JBoss Enterprise Application Platform 6.4 on Red Hat Enterprise Linux 6 are advised to upgrade to these updated packages. The JBoss server process must be restarted for the update to take effect.
    last seen2020-06-01
    modified2020-06-02
    plugin id125034
    published2019-05-14
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125034
    titleRHEL 6 : JBoss EAP (RHSA-2019:1160)
  • NASL familyAmazon Linux Local Security Checks
    NASL idALA_ALAS-2018-1055.NASL
    descriptionThe defaults settings for the CORS filter provided in Apache Tomcat are insecure and enable
    last seen2020-06-01
    modified2020-06-02
    plugin id111610
    published2018-08-10
    reporterThis script is Copyright (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/111610
    titleAmazon Linux AMI : tomcat7 / tomcat80 (ALAS-2018-1055)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DLA-1453.NASL
    descriptionThe host name verification in Tomcat when using TLS with the WebSocket client was missing. It is now enabled by default. For Debian 8
    last seen2020-06-01
    modified2020-06-02
    plugin id111394
    published2018-07-30
    reporterThis script is Copyright (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/111394
    titleDebian DLA-1453-1 : tomcat7 security update
  • NASL familyAmazon Linux Local Security Checks
    NASL idAL2_ALAS-2020-1402.NASL
    descriptionThe host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88. (CVE-2018-8034) The URL pattern of
    last seen2020-03-19
    modified2020-03-16
    plugin id134569
    published2020-03-16
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/134569
    titleAmazon Linux 2 : tomcat (ALAS-2020-1402)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-2361.NASL
    descriptionAccording to the versions of the tomcat packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - The URL pattern of
    last seen2020-05-08
    modified2019-12-10
    plugin id131853
    published2019-12-10
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/131853
    titleEulerOS 2.0 SP2 : tomcat (EulerOS-SA-2019-2361)
  • NASL familyCGI abuses
    NASL idJBOSS_EAP_RHSA-2019-1162.NASL
    descriptionThe version of Red Hat JBoss Enterprise Application Platform (EAP) installed on the remote host is 6.x prior to 6.4.22. It is therefore, affected my multiple vulnerabilities as referenced in the RHSA-2019:1162 advisory: - admin-cli: wildfly-core: Cross-site scripting (XSS) in JBoss Management Console (CVE-2018-10934) - dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents (CVE-2018-1000632) - jbossweb: tomcat: host name verification missing in WebSocket client (CVE-2018-8034) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-06-01
    modified2020-06-02
    plugin id132311
    published2019-12-19
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/132311
    titleRed Hat JBoss Enterprise Application Platform 6.x < 6.4.22 Multiple Vulnerabilities
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2019-1529.NASL
    descriptionFrom Red Hat Security Advisory 2019:1529 : An update for the pki-deps:10.6 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The Public Key Infrastructure (PKI) Deps module contains fundamental packages required as dependencies for the pki-core module by Red Hat Certificate System. Security Fix(es) : * tomcat: Due to a mishandling of close in NIO/NIO2 connectors user sessions can get mixed up (CVE-2018-8037) * tomcat: Insecure defaults in CORS filter enable
    last seen2020-06-01
    modified2020-06-02
    plugin id127594
    published2019-08-12
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/127594
    titleOracle Linux 8 : pki-deps:10.6 (ELSA-2019-1529)
  • NASL familyWeb Servers
    NASL idTOMCAT_9_0_9.NASL
    descriptionThe version of Apache Tomcat installed on the remote host is 9.0.x prior to 9.0.10. It is, therefore, affected by multiple vulnerabilities. A security misconfiguration vulnerability exists in Apache Tomcat prior to version 9.0.9 due to insecure default settings for the CORS filter (CVE-2018-8014). A security misconfiguration vulnerability exists in Apache Tomcat prior to version 9.0.10. Hostname validation was not enabled by default when using TLS with the WebSocket client (CVE-2018-8034). An information disclosure vulnerability exists in Apache Tomcat prior to version 9.0.10 due to a race condition. If an async request was completed by the application at the same time as the container triggered the async timeout, this could lead to a user being sent the response of another user (CVE-2018-8037).
    last seen2020-03-18
    modified2018-07-24
    plugin id111069
    published2018-07-24
    reporterThis script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/111069
    titleApache Tomcat 9.0.0 < 9.0.10 Multiple Vulnerabilites
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-1992.NASL
    descriptionAccording to the versions of the tomcat packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - The URL pattern of
    last seen2020-05-08
    modified2019-09-24
    plugin id129186
    published2019-09-24
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/129186
    titleEulerOS 2.0 SP5 : tomcat (EulerOS-SA-2019-1992)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2019-0131.NASL
    descriptionAn update is now available for Red Hat JBoss Web Server 3.1 for RHEL 6 and Red Hat JBoss Web Server 3.1 for RHEL 7. Red Hat Product Security has rated this release as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector (mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat Native library. This release of Red Hat JBoss Web Server 3.1 Service Pack 5 serves as a replacement for Red Hat JBoss Web Server 3.1, and includes bug fixes, which are documented in the Release Notes document linked to in the References. Security Fix(es) : * tomcat: host name verification missing in WebSocket client (CVE-2018-8034) * tomcat: Open redirect in default servlet (CVE-2018-11784) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
    last seen2020-03-18
    modified2019-01-23
    plugin id121325
    published2019-01-23
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/121325
    titleRHEL 6 / 7 : Red Hat JBoss Web Server 3.1 Service Pack 6 (RHSA-2019:0131)
  • NASL familyWeb Servers
    NASL idTOMCAT_7_0_89.NASL
    descriptionThe version of Apache Tomcat installed on the remote host is at least 7.0.41 and prior to 7.0.90. It is, therefore, affected by multiple vulnerabilities.
    last seen2020-03-18
    modified2018-07-24
    plugin id111066
    published2018-07-24
    reporterThis script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/111066
    titleApache Tomcat 7.0.41 < 7.0.90 Multiple Vulnerabilities
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2019-1161.NASL
    descriptionAn update is now available for Red Hat JBoss Enterprise Application Platform 6.4 for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 6.4.22 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.21, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix(es) : * admin-cli: wildfly-core: Cross-site scripting (XSS) in JBoss Management Console (CVE-2018-10934) * dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents (CVE-2018-1000632) * jbossweb: tomcat: host name verification missing in WebSocket client (CVE-2018-8034) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. All users of Red Hat JBoss Enterprise Application Platform 6.4 on Red Hat Enterprise Linux 7 are advised to upgrade to these updated packages. The JBoss server process must be restarted for the update to take effect.
    last seen2020-06-01
    modified2020-06-02
    plugin id125035
    published2019-05-14
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125035
    titleRHEL 7 : JBoss EAP (RHSA-2019:1161)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2019-0451.NASL
    descriptionAn update is now available for Red Hat JBoss Web Server 5.0 for RHEL 6 and Red Hat JBoss Web Server 5.0 for RHEL 7. Red Hat Product Security has rated this release as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library. This release of Red Hat JBoss Web Server 5.0 Service Pack 2 serves as a replacement for Red Hat JBoss Web Server 5.0 Service Pack 1, and includes bug fixes, which are documented in the Release Notes document linked to in the References. Security Fix(es) : * tomcat: Insecure defaults in CORS filter enable
    last seen2020-06-01
    modified2020-06-02
    plugin id122606
    published2019-03-05
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/122606
    titleRHEL 6 / 7 : Red Hat JBoss Web Server 5.0 Service Pack 2 (RHSA-2019:0451)
  • NASL familyDatabases
    NASL idORACLE_RDBMS_CPU_OCT_2019.NASL
    descriptionThe remote Oracle Database Server is missing the October 2019 Critical Patch Update (CPU). It is, therefore, affected by multiple vulnerabilities : - An unspecified vulnerability in the Java VM component of Oracle Database Server, which could allow an unauthenticated, remote attacker to manipulate Java VM accessible data. (CVE-2019-2909) - An unspecified vulnerability in the Core RDBMS (jackson-databind) component of Oracle Database Server, which could allow an authenticated, remote attacker to cause a denial of serivce of Core RDBMS. (CVE-2019-2956) - An unspecified vulnerability in the Core RDBMS component of Oracle Database Server, which could allow an authenticated, remote attacker to read a subset of Core RDBMS accessible data. (CVE-2019-2913) It is also affected by additional vulnerabilities; see the vendor advisory for more information.
    last seen2020-06-02
    modified2019-10-18
    plugin id130058
    published2019-10-18
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/130058
    titleOracle Database Server Multiple Vulnerabilities (Oct 2019 CPU)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2019-2205.NASL
    descriptionAn update for tomcat is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies. Security Fix(es) : * tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources (CVE-2018-1304) * tomcat: Late application of security constraints can lead to resource exposure for unauthorised users (CVE-2018-1305) * tomcat: Insecure defaults in CORS filter enable
    last seen2020-06-01
    modified2020-06-02
    plugin id127697
    published2019-08-12
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/127697
    titleRHEL 7 : tomcat (RHSA-2019:2205)
  • NASL familyWeb Servers
    NASL idTOMCAT_8_0_53.NASL
    descriptionThe version of Apache Tomcat installed on the remote host is 8.0.x prior to 8.0.53. It is, therefore, affected by multiple vulnerabilities.
    last seen2020-03-18
    modified2018-07-13
    plugin id111067
    published2018-07-13
    reporterThis script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/111067
    titleApache Tomcat 8.0.0 < 8.0.53 Security Constraint Weakness
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2019-2205.NASL
    descriptionAn update for tomcat is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies. Security Fix(es) : * tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources (CVE-2018-1304) * tomcat: Late application of security constraints can lead to resource exposure for unauthorised users (CVE-2018-1305) * tomcat: Insecure defaults in CORS filter enable
    last seen2020-06-01
    modified2020-06-02
    plugin id128376
    published2019-08-30
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/128376
    titleCentOS 7 : tomcat (CESA-2019:2205)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2019-770.NASL
    descriptionThis update for tomcat to version 9.0.10 fixes the following issues : Security issues fixed : - CVE-2018-1336: An improper handing of overflow in the UTF-8 decoder with supplementary characters could have lead to an infinite loop in the decoder causing a Denial of Service (bsc#1102400). - CVE-2018-8014: Fix insecure default CORS filter settings (bsc#1093697). - CVE-2018-8034: The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default (bsc#1102379). - CVE-2018-8037: If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could have resulted in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also have resulted in a user seeing a response intended for another user (bsc#1102410). Bug fixes : - Avoid overwriting of customer
    last seen2020-06-01
    modified2020-06-02
    plugin id123330
    published2019-03-27
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/123330
    titleopenSUSE Security Update : tomcat (openSUSE-2019-770)
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-3723-1.NASL
    descriptionIt was discovered that Tomcat incorrectly handled decoding certain UTF-8 strings. A remote attacker could possibly use this issue to cause Tomcat to crash, resulting in a denial of service. (CVE-2018-1336) It was discovered that the Tomcat WebSocket client incorrectly performed hostname verification. A remote attacker could possibly use this issue to intercept sensitive information. (CVE-2018-8034). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id111349
    published2018-07-26
    reporterUbuntu Security Notice (C) 2018-2019 Canonical, Inc. / NASL script (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/111349
    titleUbuntu 14.04 LTS / 16.04 LTS : tomcat7, tomcat8 vulnerabilities (USN-3723-1)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DLA-1491.NASL
    descriptionTwo security issues have been discovered in the Tomcat servlet and JSP engine. CVE-2018-1336 An improper handing of overflow in the UTF-8 decoder with supplementary characters can lead to an infinite loop in the decoder causing a Denial of Service. CVE-2018-8034 The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. For Debian 8
    last seen2020-06-01
    modified2020-06-02
    plugin id112230
    published2018-09-04
    reporterThis script is Copyright (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/112230
    titleDebian DLA-1491-1 : tomcat8 security update
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-2675.NASL
    descriptionAccording to the versions of the tomcat packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - Security constraints defined by annotations of Servlets in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 were only applied once a Servlet had been loaded. Because security constraints defined in this way apply to the URL pattern and any URLs below that point, it was possible - depending on the order Servlets were loaded - for some security constraints not to be applied. This could have exposed resources to users who were not authorised to access them.(CVE-2018-1305) - The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88.(CVE-2018-8034) - The URL pattern of
    last seen2020-05-08
    modified2019-12-18
    plugin id132210
    published2019-12-18
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/132210
    titleEulerOS 2.0 SP3 : tomcat (EulerOS-SA-2019-2675)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-4281.NASL
    descriptionSeveral issues were discovered in the Tomcat servlet and JSP engine. They could lead to unauthorized access to protected resources, denial-of-service, or information leak.
    last seen2020-06-01
    modified2020-06-02
    plugin id112185
    published2018-08-30
    reporterThis script is Copyright (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/112185
    titleDebian DSA-4281-1 : tomcat8 - security update
  • NASL familyCGI abuses
    NASL idORACLE_PRIMAVERA_P6_EPPM_CPU_APR_2019.NASL
    descriptionAccording to its self-reported version number, the Oracle Primavera P6 Enterprise Project Portfolio Management (EPPM) installation running on the remote web server is 8.4 prior to 8.4.15.10, 15.x prior to 15.2.18.4, 16.x prior to 16.2.17.2, 17.x prior to 17.12.12.0, or 18.x prior to 18.8.8.0. It is, therefore, affected by multiple vulnerabilities: - A deserialization vulnerability in Apache Commons FileUpload allows for remote code execution. (CVE-2016-1000031) - A denial of service vulnerability in the bundled third-party component OpenSSL library
    last seen2020-06-01
    modified2020-06-02
    plugin id124169
    published2019-04-19
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/124169
    titleOracle Primavera P6 Enterprise Project Portfolio Management (EPPM) Multiple Vulnerabilities (Apr 2019 CPU)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2018-B1832101B8.NASL
    descriptionThis update includes a rebase from 8.5.30 up to 8.5.32 which resolves two CVEs along with various other bugs/features : - rhbz#1579612 CVE-2018-8014 tomcat: Insecure defaults in CORS filter enable
    last seen2020-06-05
    modified2019-01-03
    plugin id120717
    published2019-01-03
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/120717
    titleFedora 28 : 1:tomcat (2018-b1832101b8)
  • NASL familyAmazon Linux Local Security Checks
    NASL idALA_ALAS-2018-1056.NASL
    descriptionThe defaults settings for the CORS filter provided in Apache Tomcat are insecure and enable
    last seen2020-06-01
    modified2020-06-02
    plugin id111611
    published2018-08-10
    reporterThis script is Copyright (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/111611
    titleAmazon Linux AMI : tomcat8 (ALAS-2018-1056)

Redhat

advisories
  • bugzilla
    id1607580
    titleCVE-2018-8034 tomcat: Host name verification missing in WebSocket client
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 7 is installed
        ovaloval:com.redhat.rhba:tst:20150364027
      • OR
        • AND
          • commenttomcat-servlet-3.0-api is earlier than 0:7.0.76-9.el7
            ovaloval:com.redhat.rhsa:tst:20192205001
          • commenttomcat-servlet-3.0-api is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140686008
        • AND
          • commenttomcat-admin-webapps is earlier than 0:7.0.76-9.el7
            ovaloval:com.redhat.rhsa:tst:20192205003
          • commenttomcat-admin-webapps is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140686002
        • AND
          • commenttomcat-jsvc is earlier than 0:7.0.76-9.el7
            ovaloval:com.redhat.rhsa:tst:20192205005
          • commenttomcat-jsvc is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140686020
        • AND
          • commenttomcat-webapps is earlier than 0:7.0.76-9.el7
            ovaloval:com.redhat.rhsa:tst:20192205007
          • commenttomcat-webapps is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140686010
        • AND
          • commenttomcat-lib is earlier than 0:7.0.76-9.el7
            ovaloval:com.redhat.rhsa:tst:20192205009
          • commenttomcat-lib is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140686012
        • AND
          • commenttomcat is earlier than 0:7.0.76-9.el7
            ovaloval:com.redhat.rhsa:tst:20192205011
          • commenttomcat is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140686006
        • AND
          • commenttomcat-docs-webapp is earlier than 0:7.0.76-9.el7
            ovaloval:com.redhat.rhsa:tst:20192205013
          • commenttomcat-docs-webapp is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140686016
        • AND
          • commenttomcat-jsp-2.2-api is earlier than 0:7.0.76-9.el7
            ovaloval:com.redhat.rhsa:tst:20192205015
          • commenttomcat-jsp-2.2-api is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140686004
        • AND
          • commenttomcat-el-2.2-api is earlier than 0:7.0.76-9.el7
            ovaloval:com.redhat.rhsa:tst:20192205017
          • commenttomcat-el-2.2-api is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140686014
        • AND
          • commenttomcat-javadoc is earlier than 0:7.0.76-9.el7
            ovaloval:com.redhat.rhsa:tst:20192205019
          • commenttomcat-javadoc is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140686018
    rhsa
    idRHSA-2019:2205
    released2019-08-06
    severityModerate
    titleRHSA-2019:2205: tomcat security, bug fix, and enhancement update (Moderate)
  • rhsa
    idRHSA-2019:0130
  • rhsa
    idRHSA-2019:0131
  • rhsa
    idRHSA-2019:0450
  • rhsa
    idRHSA-2019:0451
  • rhsa
    idRHSA-2019:1159
  • rhsa
    idRHSA-2019:1160
  • rhsa
    idRHSA-2019:1161
  • rhsa
    idRHSA-2019:1162
  • rhsa
    idRHSA-2019:1529
  • rhsa
    idRHSA-2019:3892
rpms
  • tomcat-native-0:1.2.17-18.redhat_18.ep7.el6
  • tomcat-native-0:1.2.17-18.redhat_18.ep7.el7
  • tomcat-native-debuginfo-0:1.2.17-18.redhat_18.ep7.el6
  • tomcat-native-debuginfo-0:1.2.17-18.redhat_18.ep7.el7
  • tomcat7-0:7.0.70-31.ep7.el6
  • tomcat7-0:7.0.70-31.ep7.el7
  • tomcat7-admin-webapps-0:7.0.70-31.ep7.el6
  • tomcat7-admin-webapps-0:7.0.70-31.ep7.el7
  • tomcat7-docs-webapp-0:7.0.70-31.ep7.el6
  • tomcat7-docs-webapp-0:7.0.70-31.ep7.el7
  • tomcat7-el-2.2-api-0:7.0.70-31.ep7.el6
  • tomcat7-el-2.2-api-0:7.0.70-31.ep7.el7
  • tomcat7-javadoc-0:7.0.70-31.ep7.el6
  • tomcat7-javadoc-0:7.0.70-31.ep7.el7
  • tomcat7-jsp-2.2-api-0:7.0.70-31.ep7.el6
  • tomcat7-jsp-2.2-api-0:7.0.70-31.ep7.el7
  • tomcat7-jsvc-0:7.0.70-31.ep7.el6
  • tomcat7-jsvc-0:7.0.70-31.ep7.el7
  • tomcat7-lib-0:7.0.70-31.ep7.el6
  • tomcat7-lib-0:7.0.70-31.ep7.el7
  • tomcat7-log4j-0:7.0.70-31.ep7.el6
  • tomcat7-log4j-0:7.0.70-31.ep7.el7
  • tomcat7-selinux-0:7.0.70-31.ep7.el6
  • tomcat7-selinux-0:7.0.70-31.ep7.el7
  • tomcat7-servlet-3.0-api-0:7.0.70-31.ep7.el6
  • tomcat7-servlet-3.0-api-0:7.0.70-31.ep7.el7
  • tomcat7-webapps-0:7.0.70-31.ep7.el6
  • tomcat7-webapps-0:7.0.70-31.ep7.el7
  • tomcat8-0:8.0.36-35.ep7.el6
  • tomcat8-0:8.0.36-35.ep7.el7
  • tomcat8-admin-webapps-0:8.0.36-35.ep7.el6
  • tomcat8-admin-webapps-0:8.0.36-35.ep7.el7
  • tomcat8-docs-webapp-0:8.0.36-35.ep7.el6
  • tomcat8-docs-webapp-0:8.0.36-35.ep7.el7
  • tomcat8-el-2.2-api-0:8.0.36-35.ep7.el6
  • tomcat8-el-2.2-api-0:8.0.36-35.ep7.el7
  • tomcat8-javadoc-0:8.0.36-35.ep7.el6
  • tomcat8-javadoc-0:8.0.36-35.ep7.el7
  • tomcat8-jsp-2.3-api-0:8.0.36-35.ep7.el6
  • tomcat8-jsp-2.3-api-0:8.0.36-35.ep7.el7
  • tomcat8-jsvc-0:8.0.36-35.ep7.el6
  • tomcat8-jsvc-0:8.0.36-35.ep7.el7
  • tomcat8-lib-0:8.0.36-35.ep7.el6
  • tomcat8-lib-0:8.0.36-35.ep7.el7
  • tomcat8-log4j-0:8.0.36-35.ep7.el6
  • tomcat8-log4j-0:8.0.36-35.ep7.el7
  • tomcat8-selinux-0:8.0.36-35.ep7.el6
  • tomcat8-selinux-0:8.0.36-35.ep7.el7
  • tomcat8-servlet-3.1-api-0:8.0.36-35.ep7.el6
  • tomcat8-servlet-3.1-api-0:8.0.36-35.ep7.el7
  • tomcat8-webapps-0:8.0.36-35.ep7.el6
  • tomcat8-webapps-0:8.0.36-35.ep7.el7
  • jws5-ecj-0:4.6.1-6.redhat_1.1.el6jws
  • jws5-ecj-0:4.6.1-6.redhat_1.1.el7jws
  • jws5-javapackages-tools-0:3.4.1-5.15.10.el6jws
  • jws5-javapackages-tools-0:3.4.1-5.15.10.el7jws
  • jws5-jboss-logging-0:3.3.1-5.Final_redhat_1.1.el6jws
  • jws5-jboss-logging-0:3.3.1-5.Final_redhat_1.1.el7jws
  • jws5-mod_cluster-0:1.4.0-9.Final_redhat_1.1.el6jws
  • jws5-mod_cluster-0:1.4.0-9.Final_redhat_1.1.el7jws
  • jws5-mod_cluster-tomcat-0:1.4.0-9.Final_redhat_1.1.el6jws
  • jws5-mod_cluster-tomcat-0:1.4.0-9.Final_redhat_1.1.el7jws
  • jws5-python-javapackages-0:3.4.1-5.15.10.el6jws
  • jws5-python-javapackages-0:3.4.1-5.15.10.el7jws
  • jws5-tomcat-0:9.0.7-17.redhat_16.1.el6jws
  • jws5-tomcat-0:9.0.7-17.redhat_16.1.el7jws
  • jws5-tomcat-admin-webapps-0:9.0.7-17.redhat_16.1.el6jws
  • jws5-tomcat-admin-webapps-0:9.0.7-17.redhat_16.1.el7jws
  • jws5-tomcat-docs-webapp-0:9.0.7-17.redhat_16.1.el6jws
  • jws5-tomcat-docs-webapp-0:9.0.7-17.redhat_16.1.el7jws
  • jws5-tomcat-el-3.0-api-0:9.0.7-17.redhat_16.1.el6jws
  • jws5-tomcat-el-3.0-api-0:9.0.7-17.redhat_16.1.el7jws
  • jws5-tomcat-javadoc-0:9.0.7-17.redhat_16.1.el6jws
  • jws5-tomcat-javadoc-0:9.0.7-17.redhat_16.1.el7jws
  • jws5-tomcat-jsp-2.3-api-0:9.0.7-17.redhat_16.1.el6jws
  • jws5-tomcat-jsp-2.3-api-0:9.0.7-17.redhat_16.1.el7jws
  • jws5-tomcat-jsvc-0:9.0.7-17.redhat_16.1.el6jws
  • jws5-tomcat-jsvc-0:9.0.7-17.redhat_16.1.el7jws
  • jws5-tomcat-lib-0:9.0.7-17.redhat_16.1.el6jws
  • jws5-tomcat-lib-0:9.0.7-17.redhat_16.1.el7jws
  • jws5-tomcat-native-0:1.2.17-26.redhat_26.el6jws
  • jws5-tomcat-native-0:1.2.17-26.redhat_26.el7jws
  • jws5-tomcat-native-debuginfo-0:1.2.17-26.redhat_26.el6jws
  • jws5-tomcat-native-debuginfo-0:1.2.17-26.redhat_26.el7jws
  • jws5-tomcat-selinux-0:9.0.7-17.redhat_16.1.el6jws
  • jws5-tomcat-selinux-0:9.0.7-17.redhat_16.1.el7jws
  • jws5-tomcat-servlet-4.0-api-0:9.0.7-17.redhat_16.1.el6jws
  • jws5-tomcat-servlet-4.0-api-0:9.0.7-17.redhat_16.1.el7jws
  • jws5-tomcat-vault-0:1.1.7-5.Final_redhat_2.1.el6jws
  • jws5-tomcat-vault-0:1.1.7-5.Final_redhat_2.1.el7jws
  • jws5-tomcat-vault-javadoc-0:1.1.7-5.Final_redhat_2.1.el6jws
  • jws5-tomcat-vault-javadoc-0:1.1.7-5.Final_redhat_2.1.el7jws
  • jws5-tomcat-webapps-0:9.0.7-17.redhat_16.1.el6jws
  • jws5-tomcat-webapps-0:9.0.7-17.redhat_16.1.el7jws
  • apache-cxf-0:2.7.18-8.SP7_redhat_1.1.ep6.el5
  • dom4j-eap6-0:1.6.1-22.redhat_9.1.ep6.el5
  • hornetq-0:2.3.25-28.SP29_redhat_1.1.ep6.el5
  • ironjacamar-common-api-eap6-0:1.0.43-1.Final_redhat_1.1.ep6.el5
  • ironjacamar-common-impl-eap6-0:1.0.43-1.Final_redhat_1.1.ep6.el5
  • ironjacamar-common-spi-eap6-0:1.0.43-1.Final_redhat_1.1.ep6.el5
  • ironjacamar-core-api-eap6-0:1.0.43-1.Final_redhat_1.1.ep6.el5
  • ironjacamar-core-impl-eap6-0:1.0.43-1.Final_redhat_1.1.ep6.el5
  • ironjacamar-deployers-common-eap6-0:1.0.43-1.Final_redhat_1.1.ep6.el5
  • ironjacamar-eap6-0:1.0.43-1.Final_redhat_1.1.ep6.el5
  • ironjacamar-jdbc-eap6-0:1.0.43-1.Final_redhat_1.1.ep6.el5
  • ironjacamar-spec-api-eap6-0:1.0.43-1.Final_redhat_1.1.ep6.el5
  • ironjacamar-validator-eap6-0:1.0.43-1.Final_redhat_1.1.ep6.el5
  • jboss-as-appclient-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-cli-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-client-all-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-clustering-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-cmp-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-configadmin-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-connector-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-console-0:2.5.19-1.Final_redhat_1.1.ep6.el5
  • jboss-as-controller-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-controller-client-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-core-security-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-deployment-repository-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-deployment-scanner-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-domain-http-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-domain-management-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-ee-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-ee-deployment-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-ejb3-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-embedded-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-host-controller-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-jacorb-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-jaxr-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-jaxrs-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-jdr-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-jmx-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-jpa-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-jsf-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-jsr77-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-logging-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-mail-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-management-client-content-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-messaging-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-modcluster-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-naming-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-network-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-osgi-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-osgi-configadmin-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-osgi-service-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-picketlink-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-platform-mbean-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-pojo-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-process-controller-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-protocol-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-remoting-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-sar-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-security-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-server-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-system-jmx-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-threads-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-transactions-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-version-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-web-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-webservices-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-weld-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-xts-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jboss-hal-0:2.5.19-1.Final_redhat_1.1.ep6.el5
  • jboss-remote-naming-0:1.0.15-1.Final_redhat_1.1.ep6.el5
  • jbossas-appclient-0:7.5.22-2.Final_redhat_1.1.ep6.el5
  • jbossas-bundles-0:7.5.22-2.Final_redhat_1.1.ep6.el5
  • jbossas-core-0:7.5.22-2.Final_redhat_1.1.ep6.el5
  • jbossas-domain-0:7.5.22-2.Final_redhat_1.1.ep6.el5
  • jbossas-javadocs-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jbossas-modules-eap-0:7.5.22-1.Final_redhat_1.1.ep6.el5
  • jbossas-product-eap-0:7.5.22-2.Final_redhat_1.1.ep6.el5
  • jbossas-standalone-0:7.5.22-2.Final_redhat_1.1.ep6.el5
  • jbossas-welcome-content-eap-0:7.5.22-2.Final_redhat_1.1.ep6.el5
  • jbossweb-0:7.5.30-1.Final_redhat_1.1.ep6.el5
  • resteasy-0:2.3.23-1.Final_redhat_1.1.ep6.el5
  • apache-cxf-0:2.7.18-8.SP7_redhat_1.1.ep6.el6
  • dom4j-eap6-0:1.6.1-22.redhat_9.1.ep6.el6
  • hornetq-0:2.3.25-28.SP29_redhat_1.1.ep6.el6
  • ironjacamar-common-api-eap6-0:1.0.43-1.Final_redhat_1.1.ep6.el6
  • ironjacamar-common-impl-eap6-0:1.0.43-1.Final_redhat_1.1.ep6.el6
  • ironjacamar-common-spi-eap6-0:1.0.43-1.Final_redhat_1.1.ep6.el6
  • ironjacamar-core-api-eap6-0:1.0.43-1.Final_redhat_1.1.ep6.el6
  • ironjacamar-core-impl-eap6-0:1.0.43-1.Final_redhat_1.1.ep6.el6
  • ironjacamar-deployers-common-eap6-0:1.0.43-1.Final_redhat_1.1.ep6.el6
  • ironjacamar-eap6-0:1.0.43-1.Final_redhat_1.1.ep6.el6
  • ironjacamar-jdbc-eap6-0:1.0.43-1.Final_redhat_1.1.ep6.el6
  • ironjacamar-spec-api-eap6-0:1.0.43-1.Final_redhat_1.1.ep6.el6
  • ironjacamar-validator-eap6-0:1.0.43-1.Final_redhat_1.1.ep6.el6
  • jboss-as-appclient-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-cli-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-client-all-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-clustering-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-cmp-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-configadmin-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-connector-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-console-0:2.5.19-1.Final_redhat_1.1.ep6.el6
  • jboss-as-controller-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-controller-client-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-core-security-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-deployment-repository-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-deployment-scanner-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-domain-http-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-domain-management-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-ee-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-ee-deployment-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-ejb3-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-embedded-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-host-controller-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-jacorb-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-jaxr-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-jaxrs-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-jdr-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-jmx-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-jpa-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-jsf-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-jsr77-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-logging-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-mail-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-management-client-content-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-messaging-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-modcluster-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-naming-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-network-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-osgi-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-osgi-configadmin-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-osgi-service-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-picketlink-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-platform-mbean-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-pojo-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-process-controller-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-protocol-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-remoting-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-sar-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-security-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-server-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-system-jmx-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-threads-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-transactions-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-version-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-web-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-webservices-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-weld-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-xts-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jboss-hal-0:2.5.19-1.Final_redhat_1.1.ep6.el6
  • jboss-remote-naming-0:1.0.15-1.Final_redhat_1.1.ep6.el6
  • jbossas-appclient-0:7.5.22-2.Final_redhat_1.1.ep6.el6
  • jbossas-bundles-0:7.5.22-2.Final_redhat_1.1.ep6.el6
  • jbossas-core-0:7.5.22-2.Final_redhat_1.1.ep6.el6
  • jbossas-domain-0:7.5.22-2.Final_redhat_1.1.ep6.el6
  • jbossas-javadocs-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jbossas-modules-eap-0:7.5.22-1.Final_redhat_1.1.ep6.el6
  • jbossas-product-eap-0:7.5.22-2.Final_redhat_1.1.ep6.el6
  • jbossas-standalone-0:7.5.22-2.Final_redhat_1.1.ep6.el6
  • jbossas-welcome-content-eap-0:7.5.22-2.Final_redhat_1.1.ep6.el6
  • jbossweb-0:7.5.30-1.Final_redhat_1.1.ep6.el6
  • resteasy-0:2.3.23-1.Final_redhat_1.1.ep6.el6
  • apache-cxf-0:2.7.18-8.SP7_redhat_1.1.ep6.el7
  • dom4j-eap6-0:1.6.1-22.redhat_9.1.ep6.el7
  • hornetq-0:2.3.25-28.SP29_redhat_1.1.ep6.el7
  • ironjacamar-common-api-eap6-0:1.0.43-1.Final_redhat_1.1.ep6.el7
  • ironjacamar-common-impl-eap6-0:1.0.43-1.Final_redhat_1.1.ep6.el7
  • ironjacamar-common-spi-eap6-0:1.0.43-1.Final_redhat_1.1.ep6.el7
  • ironjacamar-core-api-eap6-0:1.0.43-1.Final_redhat_1.1.ep6.el7
  • ironjacamar-core-impl-eap6-0:1.0.43-1.Final_redhat_1.1.ep6.el7
  • ironjacamar-deployers-common-eap6-0:1.0.43-1.Final_redhat_1.1.ep6.el7
  • ironjacamar-eap6-0:1.0.43-1.Final_redhat_1.1.ep6.el7
  • ironjacamar-jdbc-eap6-0:1.0.43-1.Final_redhat_1.1.ep6.el7
  • ironjacamar-spec-api-eap6-0:1.0.43-1.Final_redhat_1.1.ep6.el7
  • ironjacamar-validator-eap6-0:1.0.43-1.Final_redhat_1.1.ep6.el7
  • jboss-as-appclient-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-cli-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-client-all-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-clustering-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-cmp-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-configadmin-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-connector-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-console-0:2.5.19-1.Final_redhat_1.1.ep6.el7
  • jboss-as-controller-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-controller-client-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-core-security-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-deployment-repository-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-deployment-scanner-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-domain-http-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-domain-management-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-ee-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-ee-deployment-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-ejb3-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-embedded-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-host-controller-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-jacorb-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-jaxr-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-jaxrs-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-jdr-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-jmx-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-jpa-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-jsf-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-jsr77-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-logging-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-mail-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-management-client-content-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-messaging-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-modcluster-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-naming-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-network-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-osgi-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-osgi-configadmin-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-osgi-service-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-picketlink-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-platform-mbean-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-pojo-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-process-controller-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-protocol-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-remoting-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-sar-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-security-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-server-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-system-jmx-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-threads-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-transactions-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-version-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-web-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-webservices-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-weld-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-xts-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jboss-hal-0:2.5.19-1.Final_redhat_1.1.ep6.el7
  • jboss-remote-naming-0:1.0.15-1.Final_redhat_1.1.ep6.el7
  • jbossas-appclient-0:7.5.22-2.Final_redhat_1.1.ep6.el7
  • jbossas-bundles-0:7.5.22-2.Final_redhat_1.1.ep6.el7
  • jbossas-core-0:7.5.22-2.Final_redhat_1.1.ep6.el7
  • jbossas-domain-0:7.5.22-2.Final_redhat_1.1.ep6.el7
  • jbossas-javadocs-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jbossas-modules-eap-0:7.5.22-1.Final_redhat_1.1.ep6.el7
  • jbossas-product-eap-0:7.5.22-2.Final_redhat_1.1.ep6.el7
  • jbossas-standalone-0:7.5.22-2.Final_redhat_1.1.ep6.el7
  • jbossas-welcome-content-eap-0:7.5.22-2.Final_redhat_1.1.ep6.el7
  • jbossweb-0:7.5.30-1.Final_redhat_1.1.ep6.el7
  • resteasy-0:2.3.23-1.Final_redhat_1.1.ep6.el7
  • apache-commons-collections-0:3.2.2-10.module+el8.0.0+3248+9d514f3b
  • apache-commons-lang-0:2.6-21.module+el8.0.0+3248+9d514f3b
  • bea-stax-api-0:1.2.0-16.module+el8.0.0+3248+9d514f3b
  • glassfish-fastinfoset-0:1.2.13-9.module+el8.0.0+3248+9d514f3b
  • glassfish-jaxb-api-0:2.2.12-8.module+el8.0.0+3248+9d514f3b
  • glassfish-jaxb-core-0:2.2.11-11.module+el8.0.0+3248+9d514f3b
  • glassfish-jaxb-runtime-0:2.2.11-11.module+el8.0.0+3248+9d514f3b
  • glassfish-jaxb-txw2-0:2.2.11-11.module+el8.0.0+3248+9d514f3b
  • jackson-annotations-0:2.9.8-1.module+el8.0.0+3248+9d514f3b
  • jackson-core-0:2.9.8-1.module+el8.0.0+3248+9d514f3b
  • jackson-databind-0:2.9.8-1.module+el8.0.0+3248+9d514f3b
  • jackson-jaxrs-json-provider-0:2.9.8-1.module+el8.0.0+3248+9d514f3b
  • jackson-jaxrs-providers-0:2.9.8-1.module+el8.0.0+3248+9d514f3b
  • jackson-module-jaxb-annotations-0:2.7.6-4.module+el8.0.0+3248+9d514f3b
  • jakarta-commons-httpclient-1:3.1-28.module+el8.0.0+3248+9d514f3b
  • javassist-0:3.18.1-8.module+el8.0.0+3248+9d514f3b
  • javassist-javadoc-0:3.18.1-8.module+el8.0.0+3248+9d514f3b
  • pki-servlet-4.0-api-1:9.0.7-14.module+el8.0.0+3248+9d514f3b
  • pki-servlet-container-1:9.0.7-14.module+el8.0.0+3248+9d514f3b
  • python-nss-debugsource-0:1.0.1-10.module+el8.0.0+3248+9d514f3b
  • python-nss-doc-0:1.0.1-10.module+el8.0.0+3248+9d514f3b
  • python3-nss-0:1.0.1-10.module+el8.0.0+3248+9d514f3b
  • python3-nss-debuginfo-0:1.0.1-10.module+el8.0.0+3248+9d514f3b
  • relaxngDatatype-0:2011.1-7.module+el8.0.0+3248+9d514f3b
  • resteasy-0:3.0.26-3.module+el8.0.0+3248+9d514f3b
  • slf4j-0:1.7.25-4.module+el8.0.0+3248+9d514f3b
  • slf4j-jdk14-0:1.7.25-4.module+el8.0.0+3248+9d514f3b
  • stax-ex-0:1.7.7-8.module+el8.0.0+3248+9d514f3b
  • velocity-0:1.7-24.module+el8.0.0+3248+9d514f3b
  • xalan-j2-0:2.7.1-38.module+el8.0.0+3248+9d514f3b
  • xerces-j2-0:2.11.0-34.module+el8.0.0+3248+9d514f3b
  • xml-commons-apis-0:1.4.01-25.module+el8.0.0+3248+9d514f3b
  • xml-commons-resolver-0:1.2-26.module+el8.0.0+3248+9d514f3b
  • xmlstreambuffer-0:1.5.4-8.module+el8.0.0+3248+9d514f3b
  • xsom-0:0-19.20110809svn.module+el8.0.0+3248+9d514f3b
  • tomcat-0:7.0.76-9.el7
  • tomcat-admin-webapps-0:7.0.76-9.el7
  • tomcat-docs-webapp-0:7.0.76-9.el7
  • tomcat-el-2.2-api-0:7.0.76-9.el7
  • tomcat-javadoc-0:7.0.76-9.el7
  • tomcat-jsp-2.2-api-0:7.0.76-9.el7
  • tomcat-jsvc-0:7.0.76-9.el7
  • tomcat-lib-0:7.0.76-9.el7
  • tomcat-servlet-3.0-api-0:7.0.76-9.el7
  • tomcat-webapps-0:7.0.76-9.el7

The Hacker News

idTHN:D761F7EF41472ED13C52BD3AF1E1F9BA
last seen2018-07-24
modified2018-07-24
published2018-07-24
reporterThe Hacker News
sourcehttps://thehackernews.com/2018/07/apache-tomcat-server.html
titleApache Tomcat Patches Important Security Vulnerabilities

References