Vulnerability Description
The Apache TomEE console (tomee-webapp) has a XSS vulnerability which could allow javascript to be executed if the user is given a malicious URL. This web application is typically used to add TomEE features to a Tomcat installation. The TomEE bundles do not ship with this application included. This issue can be mitigated by removing the application after TomEE is setup (if using the application to install TomEE), using one of the provided pre-configured bundles, or by upgrading to TomEE 7.0.5. This issue is resolve in this commit: b8bbf50c23ce97dd64f3a5d77f78f84e47579863.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Tomee | < 7.0.5 |
Related Weaknesses (CWE)
References
- https://lists.apache.org/thread.html/c4b0d83a534d6cdf2de54dbbd00e3538072ac2e3607
- https://lists.apache.org/thread.html/c4b0d83a534d6cdf2de54dbbd00e3538072ac2e3607
FAQ
What is CVE-2018-8031?
CVE-2018-8031 is a vulnerability with a CVSS score of 6.1 (MEDIUM). The Apache TomEE console (tomee-webapp) has a XSS vulnerability which could allow javascript to be executed if the user is given a malicious URL. This web application is typically used to add TomEE fe...
How severe is CVE-2018-8031?
CVE-2018-8031 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-8031?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Tomee.