CVE-2018-8037
moderate-risk
Published 2018-08-02
If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31.
Do I need to act?
~
8.4% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.9/10
Medium
NETWORK
/ HIGH complexity
Affected Products (20)
References (52)
Third Party Advisory
http://www.securityfocus.com/bid/104894
Third Party Advisory
http://www.securitytracker.com/id/1041376
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2867
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2868
and 32 more references
48
/ 100
moderate-risk
Severity
18/34 · Moderate
Exploitability
10/34 · Low
Exposure
20/34 · Moderate