Insufficiently Protected Credentials in Apache Tomcat
        
  High severity
        
          GitHub Reviewed
      
        Published
          Dec 26, 2019 
          to the GitHub Advisory Database
          •
          Updated Feb 1, 2023 
      
  
Package
Affected versions
< 7.0.98
      >= 8.0.0, < 8.5.48
      >= 9.0.0, < 9.0.29
  Patched versions
7.0.99
      8.5.49
      9.0.29
  Description
        Published by the National Vulnerability Database
      Dec 23, 2019 
    
  
        Reviewed
      Dec 26, 2019 
    
  
        Published to the GitHub Advisory Database
      Dec 26, 2019 
    
  
        Last updated
      Feb 1, 2023 
    
  
When Apache Tomcat 9.0.0.M1 to 9.0.28, 8.5.0 to 8.5.47, 7.0.0 and 7.0.97 is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files is able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and gain complete control over the Tomcat instance.
References