When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
No history.
Information
Published : 2018-10-04 13:29
Updated : 2023-12-08 16:41
NVD link : CVE-2018-11784
Mitre link : CVE-2018-11784
CVE.ORG link : CVE-2018-11784
JSON object : View
Products Affected
redhat
- enterprise_linux_server
- enterprise_linux_server_aus
- enterprise_linux_desktop
- enterprise_linux_server_eus
- enterprise_linux_server_tus
- enterprise_linux_workstation
oracle
- communications_application_session_controller
- instantis_enterprisetrack
- retail_order_broker
- secure_global_desktop
- hospitality_guest_access
canonical
- ubuntu_linux
apache
- tomcat
debian
- debian_linux
netapp
- snap_creator_framework
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')