RHSA-2019:0450

Vulnerability from csaf_redhat - Published: 2019-03-04 17:35 - Updated: 2026-03-19 07:42
Summary
Red Hat Security Advisory: Red Hat JBoss Web Server 5.0 Service Pack 2 security and bug fix update
Severity
Moderate
Notes
Topic: An update is now available for Red Hat JBoss Web Server 5.0 for RHEL 6 and Red Hat JBoss Web Server 5.0 for RHEL 7. Red Hat Product Security has rated this release as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details: Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library. This release of Red Hat JBoss Web Server 5.0 Service Pack 2 serves as a replacement for Red Hat JBoss Web Server 5.0 Service Pack 1, and includes bug fixes, which are documented in the Release Notes document linked to in the References. Security Fix(es): * tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins (CVE-2018-8014) * tomcat: host name verification missing in WebSocket client (CVE-2018-8034) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to 9.0.8, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, 7.0.41 to 7.0.88 are insecure and enable 'supportsCredentials' for all origins. It is expected that users of the CORS filter will have configured it appropriately for their environment rather than using it in the default configuration. Therefore, it is expected that most users will not be impacted by this issue.

CWE-284 - Improper Access Control
Vendor Fix Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files). For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2019:0450
Workaround When using the CORS filter, it is recommended to configure it explicitly for your environment. In particular, the combination of `cors.allowed.origins = *` and `cors.support.credentials = True` should be avoided as this can leave your application vulnerable to cross-site scripting (XSS). For details on configuring CORS filter, please refer to https://tomcat.apache.org/tomcat-7.0-doc/config/filter.html#CORS_Filter

The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88.

CWE-20 - Improper Input Validation
Vendor Fix Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files). For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2019:0450
References
https://access.redhat.com/errata/RHSA-2019:0450 self
https://access.redhat.com/security/updates/classi… external
https://bugzilla.redhat.com/show_bug.cgi?id=1579611 external
https://bugzilla.redhat.com/show_bug.cgi?id=1607580 external
https://issues.redhat.com/browse/JWS-1069 external
https://issues.redhat.com/browse/JWS-1070 external
https://issues.redhat.com/browse/JWS-1071 external
https://issues.redhat.com/browse/JWS-1072 external
https://issues.redhat.com/browse/JWS-1073 external
https://issues.redhat.com/browse/JWS-1074 external
https://issues.redhat.com/browse/JWS-1080 external
https://issues.redhat.com/browse/JWS-1122 external
https://issues.redhat.com/browse/JWS-1123 external
https://issues.redhat.com/browse/JWS-1153 external
https://issues.redhat.com/browse/JWS-1160 external
https://issues.redhat.com/browse/JWS-1164 external
https://issues.redhat.com/browse/JWS-1281 external
https://issues.redhat.com/browse/JWS-1286 external
https://issues.redhat.com/browse/JWS-1290 external
https://issues.redhat.com/browse/JWS-849 external
https://security.access.redhat.com/data/csaf/v2/a… self
https://access.redhat.com/security/cve/CVE-2018-8014 self
https://bugzilla.redhat.com/show_bug.cgi?id=1579611 external
https://www.cve.org/CVERecord?id=CVE-2018-8014 external
https://nvd.nist.gov/vuln/detail/CVE-2018-8014 external
http://tomcat.apache.org/security-7.html#Fixed_in… external
http://tomcat.apache.org/security-8.html#Fixed_in… external
http://tomcat.apache.org/security-8.html#Fixed_in… external
http://tomcat.apache.org/security-9.html#Fixed_in… external
https://access.redhat.com/security/cve/CVE-2018-8034 self
https://bugzilla.redhat.com/show_bug.cgi?id=1607580 external
https://www.cve.org/CVERecord?id=CVE-2018-8034 external
https://nvd.nist.gov/vuln/detail/CVE-2018-8034 external

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update is now available for Red Hat JBoss Web Server 5.0 for RHEL 6 and Red Hat JBoss Web Server 5.0 for RHEL 7.\n\nRed Hat Product Security has rated this release as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 5.0 Service Pack 2 serves as a replacement for Red Hat JBoss Web Server 5.0 Service Pack 1, and includes bug fixes, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* tomcat: Insecure defaults in CORS filter enable \u0027supportsCredentials\u0027 for all origins (CVE-2018-8014)\n* tomcat: host name verification missing in WebSocket client (CVE-2018-8034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2019:0450",
        "url": "https://access.redhat.com/errata/RHSA-2019:0450"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "1579611",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1579611"
      },
      {
        "category": "external",
        "summary": "1607580",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607580"
      },
      {
        "category": "external",
        "summary": "JWS-1069",
        "url": "https://issues.redhat.com/browse/JWS-1069"
      },
      {
        "category": "external",
        "summary": "JWS-1070",
        "url": "https://issues.redhat.com/browse/JWS-1070"
      },
      {
        "category": "external",
        "summary": "JWS-1071",
        "url": "https://issues.redhat.com/browse/JWS-1071"
      },
      {
        "category": "external",
        "summary": "JWS-1072",
        "url": "https://issues.redhat.com/browse/JWS-1072"
      },
      {
        "category": "external",
        "summary": "JWS-1073",
        "url": "https://issues.redhat.com/browse/JWS-1073"
      },
      {
        "category": "external",
        "summary": "JWS-1074",
        "url": "https://issues.redhat.com/browse/JWS-1074"
      },
      {
        "category": "external",
        "summary": "JWS-1080",
        "url": "https://issues.redhat.com/browse/JWS-1080"
      },
      {
        "category": "external",
        "summary": "JWS-1122",
        "url": "https://issues.redhat.com/browse/JWS-1122"
      },
      {
        "category": "external",
        "summary": "JWS-1123",
        "url": "https://issues.redhat.com/browse/JWS-1123"
      },
      {
        "category": "external",
        "summary": "JWS-1153",
        "url": "https://issues.redhat.com/browse/JWS-1153"
      },
      {
        "category": "external",
        "summary": "JWS-1160",
        "url": "https://issues.redhat.com/browse/JWS-1160"
      },
      {
        "category": "external",
        "summary": "JWS-1164",
        "url": "https://issues.redhat.com/browse/JWS-1164"
      },
      {
        "category": "external",
        "summary": "JWS-1281",
        "url": "https://issues.redhat.com/browse/JWS-1281"
      },
      {
        "category": "external",
        "summary": "JWS-1286",
        "url": "https://issues.redhat.com/browse/JWS-1286"
      },
      {
        "category": "external",
        "summary": "JWS-1290",
        "url": "https://issues.redhat.com/browse/JWS-1290"
      },
      {
        "category": "external",
        "summary": "JWS-849",
        "url": "https://issues.redhat.com/browse/JWS-849"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_0450.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat JBoss Web Server 5.0 Service Pack 2 security and bug fix update",
    "tracking": {
      "current_release_date": "2026-03-19T07:42:44+00:00",
      "generator": {
        "date": "2026-03-19T07:42:44+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.7.3"
        }
      },
      "id": "RHSA-2019:0450",
      "initial_release_date": "2019-03-04T17:35:02+00:00",
      "revision_history": [
        {
          "date": "2019-03-04T17:35:02+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2019-03-04T17:35:02+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2026-03-19T07:42:44+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat JBoss Web Server 5.0",
                "product": {
                  "name": "Red Hat JBoss Web Server 5.0",
                  "product_id": "Red Hat JBoss Web Server 5.0",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:5.0"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat JBoss Web Server"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2018-8014",
      "cwe": {
        "id": "CWE-284",
        "name": "Improper Access Control"
      },
      "discovery_date": "2018-05-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1579611"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to 9.0.8, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, 7.0.41 to 7.0.88 are insecure and enable \u0027supportsCredentials\u0027 for all origins. It is expected that users of the CORS filter will have configured it appropriately for their environment rather than using it in the default configuration. Therefore, it is expected that most users will not be impacted by this issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: Insecure defaults in CORS filter enable \u0027supportsCredentials\u0027 for all origins",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 5.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-8014"
        },
        {
          "category": "external",
          "summary": "RHBZ#1579611",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1579611"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-8014",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-8014"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8014",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8014"
        },
        {
          "category": "external",
          "summary": "http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.89",
          "url": "http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.89"
        },
        {
          "category": "external",
          "summary": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.53",
          "url": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.53"
        },
        {
          "category": "external",
          "summary": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.32",
          "url": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.32"
        },
        {
          "category": "external",
          "summary": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.9",
          "url": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.9"
        }
      ],
      "release_date": "2018-05-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-03-04T17:35:02+00:00",
          "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "Red Hat JBoss Web Server 5.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2019:0450"
        },
        {
          "category": "workaround",
          "details": "When using the CORS filter, it is recommended to configure it explicitly for your environment.  In particular, the combination of `cors.allowed.origins = *` and `cors.support.credentials = True` should be avoided as this  can leave your application vulnerable to cross-site scripting (XSS). For details on configuring CORS filter, please refer to https://tomcat.apache.org/tomcat-7.0-doc/config/filter.html#CORS_Filter",
          "product_ids": [
            "Red Hat JBoss Web Server 5.0"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "Red Hat JBoss Web Server 5.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "tomcat: Insecure defaults in CORS filter enable \u0027supportsCredentials\u0027 for all origins"
    },
    {
      "cve": "CVE-2018-8034",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2018-07-22T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1607580"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: Host name verification missing in WebSocket client",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Tomcat 6, and Red Hat products shipping it, are not affected by this CVE. Tomcat 7, 8, and 9, as well as Red Hat Products shipping them, are affected. Affected products, including Red Hat JBoss Web Server 3 and 5, Enterprise Application Server 6, and Fuse 7, may provide fixes for this issue in a future release.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 5.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-8034"
        },
        {
          "category": "external",
          "summary": "RHBZ#1607580",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607580"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-8034",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-8034"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8034",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8034"
        }
      ],
      "release_date": "2018-07-22T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-03-04T17:35:02+00:00",
          "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "Red Hat JBoss Web Server 5.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2019:0450"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
            "version": "3.0"
          },
          "products": [
            "Red Hat JBoss Web Server 5.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tomcat: Host name verification missing in WebSocket client"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…