Rapid7 Vulnerability & Exploit Database

Amazon Linux AMI: CVE-2018-8037: Security patch for tomcat8 (ALAS-2018-1056)

Back to Search

Amazon Linux AMI: CVE-2018-8037: Security patch for tomcat8 (ALAS-2018-1056)

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
Published
08/02/2018
Created
03/19/2019
Added
08/11/2018
Modified
05/07/2019

Description

If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31.

Solution(s)

  • amazon-linux-upgrade-tomcat8

References

  • amazon-linux-upgrade-tomcat8

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;