CVE-2019-12418 (CNNVD-201912-924)
中文标题:
Apache Tomcat 安全漏洞
英文标题:
When Apache Tomcat 9.0.0.M1 to 9.0.28, 8.5.0 to 8.5.47, 7.0.0 and 7.0.97 is configured with the JMX ...
漏洞描述
中文描述:
Apache Tomcat是美国阿帕奇(Apache)软件基金会的一款轻量级Web应用服务器。该程序实现了对Servlet和JavaServer Page(JSP)的支持。 Apache Tomcat 9.0.0.M1版本至9.0.28版本、8.5.0版本至8.5.47版本和7.0.0版本至7.0.97版本中存在安全漏洞。攻击者可通过实施中间人攻击利用该漏洞获取用户名和密码,访问JMX界面,控制Tomcat实例。
英文描述:
When Apache Tomcat 9.0.0.M1 to 9.0.28, 8.5.0 to 8.5.47, 7.0.0 and 7.0.97 is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files is able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and gain complete control over the Tomcat instance.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Apache Software Foundation | Apache Tomcat | 9.0.0.M1 to 9.0.28 | - | - |
cpe:2.3:a:apache_software_foundation:apache_tomcat:9.0.0.m1_to_9.0.28:*:*:*:*:*:*:*
|
| Apache Software Foundation | Apache Tomcat | 8.5.0 to 8.5.47 | - | - |
cpe:2.3:a:apache_software_foundation:apache_tomcat:8.5.0_to_8.5.47:*:*:*:*:*:*:*
|
| Apache Software Foundation | Apache Tomcat | 7.0.0 to 7.0.97 | - | - |
cpe:2.3:a:apache_software_foundation:apache_tomcat:7.0.0_to_7.0.97:*:*:*:*:*:*:*
|
| apache | tomcat | * | - | - |
cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*
|
| debian | debian_linux | 8.0 | - | - |
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
|
| debian | debian_linux | 9.0 | - | - |
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
|
| debian | debian_linux | 10.0 | - | - |
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
|
| oracle | workload_manager | 12.2.0.1 | - | - |
cpe:2.3:a:oracle:workload_manager:12.2.0.1:*:*:*:*:*:*:*
|
| oracle | workload_manager | 18c | - | - |
cpe:2.3:a:oracle:workload_manager:18c:*:*:*:*:*:*:*
|
| oracle | workload_manager | 19c | - | - |
cpe:2.3:a:oracle:workload_manager:19c:*:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 16.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
|
| opensuse | leap | 15.1 | - | - |
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
|
| netapp | oncommand_system_manager | * | - | - |
cpe:2.3:a:netapp:oncommand_system_manager:*:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
CVSS评分详情
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2019-12418 |
2025-11-11 15:20:00 | 2025-11-11 07:35:30 |
| NVD | nvd_CVE-2019-12418 |
2025-11-11 14:56:30 | 2025-11-11 07:44:03 |
| CNNVD | cnnvd_CNNVD-201912-924 |
2025-11-11 15:10:20 | 2025-11-11 07:55:19 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 其他
- cnnvd_id: 未提取 -> CNNVD-201912-924
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
- cvss_score: 未提取 -> 7.0
- cvss_vector: NOT_EXTRACTED -> CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
- cvss_version: NOT_EXTRACTED -> 3.1
- affected_products_count: 3 -> 13
- data_sources: ['cve'] -> ['cve', 'nvd']