CVE-2018-8034
Host Name Verification Bypass vulnerability in tomcat-embed-core (Maven)
What is CVE-2018-8034 About?
This vulnerability in Apache Tomcat versions 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88, is a host name verification bypass in its WebSocket client when using TLS. The missing verification could allow an attacker to perform man-in-the-middle attacks. Exploitation requires the attacker to intercept and modify network traffic.
Affected Software
- org.apache.tomcat.embed:tomcat-embed-core
- >8.5.0, <8.5.32
- >7.0.35, <7.0.90
- >8.0.0, <8.0.53
- >9.0.0, <9.0.10
Technical Details
Apache Tomcat's WebSocket client, in the specified vulnerable versions, failed to perform proper host name verification when establishing a TLS connection. This means that if the client connected to a server whose certificate validly signed for a different hostname, or if an attacker presented a certificate for an arbitrary hostname, the client would still establish the TLS connection without warning. An attacker capable of intercepting network traffic (e.g., via DNS poisoning, ARP spoofing, or control over a network path) could perform a man-in-the-middle (MITM) attack. They could then impersonate the legitimate WebSocket server, intercepting or altering communications between the client and the server, despite the use of TLS encryption, because the identity of the server was not properly validated against its hostname.
What is the Impact of CVE-2018-8034?
Successful exploitation may allow attackers to perform man-in-the-middle (MITM) attacks, intercepting or altering sensitive communications over TLS connections.
What is the Exploitability of CVE-2018-8034?
Exploitation requires an attacker to be in a man-in-the-middle position between the Tomcat WebSocket client and its intended server, and to present a valid but possibly mismatched TLS certificate. The complexity is moderate, involving network-level manipulation and certificate issuance/acquisition. No authentication or specific application privileges are typically required on the victim's end, as the vulnerability resides in the client's TLS handshake verification. This is a network-based, remote vulnerability. The likelihood of exploitation is higher in environments where an attacker can easily manipulate network traffic or obtain trusted certificates for their attack infrastructure.
What are the Known Public Exploits?
| PoC Author | Link | Commentary |
|---|---|---|
| No known exploits | ||
What are the Available Fixes for CVE-2018-8034?
Available Upgrade Options
- org.apache.tomcat.embed:tomcat-embed-core
- >7.0.35, <7.0.90 → Upgrade to 7.0.90
- org.apache.tomcat.embed:tomcat-embed-core
- >8.0.0, <8.0.53 → Upgrade to 8.0.53
- org.apache.tomcat.embed:tomcat-embed-core
- >8.5.0, <8.5.32 → Upgrade to 8.5.32
- org.apache.tomcat.embed:tomcat-embed-core
- >9.0.0, <9.0.10 → Upgrade to 9.0.10
Struggling with dependency upgrades?
See how Resolved Security's drop-in replacements make it simple.
Book a demoAdditional Resources
- https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
- http://mail-archives.us.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180722091057.GA70283%40minotaur.apache.org%3E
- https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
What are Similar Vulnerabilities to CVE-2018-8034?
Similar Vulnerabilities: CVE-2014-0099 , CVE-2014-3577 , CVE-2017-1000216 , CVE-2019-10086 , CVE-2020-13935
