9.3

CVE-2019-0232

When running on Windows with enableCmdLineArguments enabled, the CGI Servlet in Apache Tomcat 9.0.0.M1 to 9.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 is vulnerable to Remote Code Execution due to a bug in the way the JRE passes command line arguments to Windows. The CGI Servlet is disabled by default. The CGI option enableCmdLineArguments is disable by default in Tomcat 9.0.x (and will be disabled by default in all versions in response to this vulnerability). For a detailed explanation of the JRE behaviour, see Markus Wulftange's blog (https://codewhitesec.blogspot.com/2016/02/java-and-command-line-injections-in-windows.html) and this archived MSDN blog (https://web.archive.org/web/20161228144344/https://blogs.msdn.microsoft.com/twistylittlepassagesallalike/2011/04/23/everyone-quotes-command-line-arguments-the-wrong-way/).

Data is provided by the National Vulnerability Database (NVD)
ApacheTomcat Version >= 7.0.0 <= 7.0.93
   MicrosoftWindows Version-
ApacheTomcat Version >= 8.5.0 <= 8.5.39
   MicrosoftWindows Version-
ApacheTomcat Version >= 9.0.1 <= 9.0.17
   MicrosoftWindows Version-
ApacheTomcat Version9.0.0 Updatemilestone1
   MicrosoftWindows Version-
ApacheTomcat Version9.0.0 Updatemilestone10
   MicrosoftWindows Version-
ApacheTomcat Version9.0.0 Updatemilestone11
   MicrosoftWindows Version-
ApacheTomcat Version9.0.0 Updatemilestone12
   MicrosoftWindows Version-
ApacheTomcat Version9.0.0 Updatemilestone13
   MicrosoftWindows Version-
ApacheTomcat Version9.0.0 Updatemilestone14
   MicrosoftWindows Version-
ApacheTomcat Version9.0.0 Updatemilestone15
   MicrosoftWindows Version-
ApacheTomcat Version9.0.0 Updatemilestone16
   MicrosoftWindows Version-
ApacheTomcat Version9.0.0 Updatemilestone17
   MicrosoftWindows Version-
ApacheTomcat Version9.0.0 Updatemilestone18
   MicrosoftWindows Version-
ApacheTomcat Version9.0.0 Updatemilestone19
   MicrosoftWindows Version-
ApacheTomcat Version9.0.0 Updatemilestone2
   MicrosoftWindows Version-
ApacheTomcat Version9.0.0 Updatemilestone20
   MicrosoftWindows Version-
ApacheTomcat Version9.0.0 Updatemilestone21
   MicrosoftWindows Version-
ApacheTomcat Version9.0.0 Updatemilestone22
   MicrosoftWindows Version-
ApacheTomcat Version9.0.0 Updatemilestone23
   MicrosoftWindows Version-
ApacheTomcat Version9.0.0 Updatemilestone24
   MicrosoftWindows Version-
ApacheTomcat Version9.0.0 Updatemilestone25
   MicrosoftWindows Version-
ApacheTomcat Version9.0.0 Updatemilestone26
   MicrosoftWindows Version-
ApacheTomcat Version9.0.0 Updatemilestone3
   MicrosoftWindows Version-
ApacheTomcat Version9.0.0 Updatemilestone4
   MicrosoftWindows Version-
ApacheTomcat Version9.0.0 Updatemilestone5
   MicrosoftWindows Version-
ApacheTomcat Version9.0.0 Updatemilestone6
   MicrosoftWindows Version-
ApacheTomcat Version9.0.0 Updatemilestone7
   MicrosoftWindows Version-
ApacheTomcat Version9.0.0 Updatemilestone8
   MicrosoftWindows Version-
ApacheTomcat Version9.0.0 Updatemilestone9
   MicrosoftWindows Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 94.16% 0.999
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 8.1 2.2 5.9
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 9.3 8.6 10
AV:N/AC:M/Au:N/C:C/I:C/A:C
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.

http://www.securityfocus.com/bid/107906
Third Party Advisory
VDB Entry