CVE-2019-12418: In Apache Tomcat, a local attacker may be able to perform a man-in-the-middle attack to capture user names and passwords
(updated )
When Apache Tomcat 9.0.0.M1 to 9.0.28, 8.5.0 to 8.5.47, 7.0.0 and 7.0.97 is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files is able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and gain complete control over the Tomcat instance.
References
- lists.opensuse.org/opensuse-security-announce/2020-01/msg00013.html
- github.com/advisories/GHSA-hh3j-x4mc-g48r
- lists.apache.org/thread.html/43530b91506e2e0c11cfbe691173f5df8c48f51b98262426d7493b67%40%3Cannounce.tomcat.apache.org%3E
- lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
- lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
- lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
- lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
- lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
- lists.debian.org/debian-lts-announce/2020/01/msg00024.html
- lists.debian.org/debian-lts-announce/2020/03/msg00029.html
- nvd.nist.gov/vuln/detail/CVE-2019-12418
- seclists.org/bugtraq/2019/Dec/43
- security.gentoo.org/glsa/202003-43
- security.netapp.com/advisory/ntap-20200107-0001/
- support.f5.com/csp/article/K10107360?utm_source=f5support&utm_medium=RSS
- usn.ubuntu.com/4251-1/
- www.debian.org/security/2019/dsa-4596
- www.debian.org/security/2020/dsa-4680
- www.oracle.com/security-alerts/cpuapr2020.html
Detect and mitigate CVE-2019-12418 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →