CVE-2018-8014
high-risk
Published 2018-05-16
The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to 9.0.8, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, 7.0.41 to 7.0.88 are insecure and enable 'supportsCredentials' for all origins. It is expected that users of the CORS filter will have configured it appropriately for their environment rather than using it in the default configuration. Therefore, it is expected that most users will not be impacted by this issue.
Do I need to act?
!
48.8% chance of exploitation in next 30 days
EPSS score — higher than 51% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (14)
References (78)
Vendor Advisory
http://tomcat.apache.org/security-7.html
Vendor Advisory
http://tomcat.apache.org/security-8.html
Vendor Advisory
http://tomcat.apache.org/security-9.html
Third Party Advisory
http://www.securityfocus.com/bid/104203
Third Party Advisory
http://www.securitytracker.com/id/1040998
Third Party Advisory
http://www.securitytracker.com/id/1041888
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2469
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2470
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3768
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0450
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0451
and 58 more references
68
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
18/34 · Moderate
Exposure
18/34 · Moderate