**Issue Overview:**
The SSI printenv command in Apache Tomcat 9.0.0.M1 to 9.0.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 echoes user provided data without escaping and is, therefore, vulnerable to XSS. SSI is disabled by default. The printenv command is intended for debugging and is unlikely to be present in a production website. (CVE-2019-0221)
**Affected Packages:**
tomcat
**Issue Correction:**
Run _yum update tomcat_ to update your system.
**New Packages:**
noarch:
   tomcat-7.0.76-10.amzn2.0.5.noarch
   tomcat-admin-webapps-7.0.76-10.amzn2.0.5.noarch
   tomcat-docs-webapp-7.0.76-10.amzn2.0.5.noarch
   tomcat-javadoc-7.0.76-10.amzn2.0.5.noarch
   tomcat-jsvc-7.0.76-10.amzn2.0.5.noarch
   tomcat-jsp-2.2-api-7.0.76-10.amzn2.0.5.noarch
   tomcat-lib-7.0.76-10.amzn2.0.5.noarch
   tomcat-servlet-3.0-api-7.0.76-10.amzn2.0.5.noarch
   tomcat-el-2.2-api-7.0.76-10.amzn2.0.5.noarch
   tomcat-webapps-7.0.76-10.amzn2.0.5.noarch
src:
   tomcat-7.0.76-10.amzn2.0.5.src
### Additional References
Red Hat: [CVE-2019-0221]()
Mitre: [CVE-2019-0221]()Read More
References
Back to Main