Site icon API Security Blog

Medium: tomcat

**Issue Overview:**

The SSI printenv command in Apache Tomcat 9.0.0.M1 to 9.0.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 echoes user provided data without escaping and is, therefore, vulnerable to XSS. SSI is disabled by default. The printenv command is intended for debugging and is unlikely to be present in a production website. (CVE-2019-0221)

**Affected Packages:**

tomcat

**Issue Correction:**
Run _yum update tomcat_ to update your system.

**New Packages:**

noarch:
    tomcat-7.0.76-10.amzn2.0.5.noarch
    tomcat-admin-webapps-7.0.76-10.amzn2.0.5.noarch
    tomcat-docs-webapp-7.0.76-10.amzn2.0.5.noarch
    tomcat-javadoc-7.0.76-10.amzn2.0.5.noarch
    tomcat-jsvc-7.0.76-10.amzn2.0.5.noarch
    tomcat-jsp-2.2-api-7.0.76-10.amzn2.0.5.noarch
    tomcat-lib-7.0.76-10.amzn2.0.5.noarch
    tomcat-servlet-3.0-api-7.0.76-10.amzn2.0.5.noarch
    tomcat-el-2.2-api-7.0.76-10.amzn2.0.5.noarch
    tomcat-webapps-7.0.76-10.amzn2.0.5.noarch

src:
    tomcat-7.0.76-10.amzn2.0.5.src

### Additional References

Red Hat: [CVE-2019-0221]()

Mitre: [CVE-2019-0221]()Read More

Exit mobile version