Miggo Logo

CVE-2019-0232:
Apache Tomcat Windows CGI Command Injection Vulnerability

8.1

CVSS Score

Basic Information

EPSS Score
-
Published
4/18/2019
Updated
12/8/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.apache.tomcat.embed:tomcat-embed-coremaven>= 8.0.0, < 8.5.408.5.40
org.apache.tomcat.embed:tomcat-embed-coremaven>= 7.0.0, < 7.0.947.0.94
org.apache.tomcat.embed:tomcat-embed-coremaven>= 9.0.0.M1, < 9.0.179.0.17

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The CGI Servlet is the primary component affected by the vulnerability. The patch modifies the CGI Servlet to introduce input validation for command line arguments, indicating that the servlet's handling of these arguments was the source of the vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

W**n runnin* on Win*ows wit* *n**l**m*Lin**r*um*nts *n**l**, t** **I S*rvl*t in *p**** Tom**t *.*.*.M* to *.*.**, *.*.* to *.*.** *n* *.*.* to *.*.** is vuln*r**l* to R*mot* *o** *x**ution *u* to * *u* in t** w*y t** JR* p*ss*s *omm*n* lin* *r*um*nts

Reasoning

T** **I S*rvl*t is t** prim*ry *ompon*nt *****t** *y t** vuln*r**ility. T** p*t** mo*i*i*s t** **I S*rvl*t to intro*u** input v*li**tion *or *omm*n* lin* *r*um*nts, in*i**tin* t**t t** s*rvl*t's **n*lin* o* t**s* *r*um*nts w*s t** sour** o* t** vuln*