Rapid7 Vulnerability & Exploit Database

Alma Linux: CVE-2018-11784: Important: pki-deps:10.6 security update (ALSA-2019-1529)

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Alma Linux: CVE-2018-11784: Important: pki-deps:10.6 security update (ALSA-2019-1529)

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
10/04/2018
Created
05/14/2022
Added
05/13/2022
Modified
11/27/2024

Description

When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice.

Solution(s)

  • alma-upgrade-apache-commons-collections
  • alma-upgrade-apache-commons-lang
  • alma-upgrade-bea-stax-api
  • alma-upgrade-glassfish-fastinfoset
  • alma-upgrade-glassfish-jaxb-api
  • alma-upgrade-glassfish-jaxb-core
  • alma-upgrade-glassfish-jaxb-runtime
  • alma-upgrade-glassfish-jaxb-txw2
  • alma-upgrade-jackson-module-jaxb-annotations
  • alma-upgrade-jakarta-commons-httpclient
  • alma-upgrade-javassist
  • alma-upgrade-javassist-javadoc
  • alma-upgrade-python-nss-doc
  • alma-upgrade-python3-nss
  • alma-upgrade-relaxngdatatype
  • alma-upgrade-slf4j
  • alma-upgrade-slf4j-jdk14
  • alma-upgrade-stax-ex
  • alma-upgrade-velocity
  • alma-upgrade-xalan-j2
  • alma-upgrade-xerces-j2
  • alma-upgrade-xml-commons-apis
  • alma-upgrade-xml-commons-resolver
  • alma-upgrade-xmlstreambuffer
  • alma-upgrade-xsom

insightVM

Advanced vulnerability management analytics and reporting.
Key Features
  • Lightweight Endpoint Agent
  • Live Dashboards
  • Real Risk Prioritization
  • IT-Integrated Remediation Projects
  • Cloud, Virtual, and Container Assessment
  • Integrated Threat Feeds
  • Easy-to-Use RESTful API
  • Automation-Assisted Patching
  • Automated Containment
Free InsightVM Trial View All Features

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;