stefanfreitag / sht21

Other
0 stars 0 forks source link

CVE-2018-8034 (High) detected in tomcat-embed-websocket-8.5.23.jar #40

Closed mend-bolt-for-github[bot] closed 5 years ago

mend-bolt-for-github[bot] commented 5 years ago

CVE-2018-8034 - High Severity Vulnerability

Vulnerable Library - tomcat-embed-websocket-8.5.23.jar

Core Tomcat implementation

Library home page: http://tomcat.apache.org/

Path to dependency file: /tmp/ws-scm/sht21/sht21-backend/build.gradle

Path to vulnerable library: /root/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-websocket/8.5.23/52f07abcae10dc7e1764304b0877def175c2c833/tomcat-embed-websocket-8.5.23.jar

Dependency Hierarchy: - spring-boot-starter-data-rest-1.5.9.RELEASE.jar (Root Library) - spring-boot-starter-web-1.5.9.RELEASE.jar - spring-boot-starter-tomcat-1.5.9.RELEASE.jar - :x: **tomcat-embed-websocket-8.5.23.jar** (Vulnerable Library)

Found in HEAD commit: 4057e364d8f0e9a2d440890a01e74a338ec8ffbd

Vulnerability Details

The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88.

Publish Date: 2018-08-01

URL: CVE-2018-8034

CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8034

Release Date: 2018-08-01

Fix Resolution: org.apache.tomcat:tomcat-websocket:7.0.90,org.apache.tomcat:tomcat-websocket: 8.0.53,org.apache.tomcat:tomcat-websocket: 8.5.32,org.apache.tomcat:tomcat-websocket: 9.0.10


Step up your Open Source Security Game with WhiteSource here