Uočena su dva sigurnosna propusta u radu programskog paketa Apache Tomcat. Apache Tomcat je poslužitelj web aplikacija namijenjen Java Servlet i JavaServer Pages tehnologijama. Prvi je propust posljedica neodgovarajuće provjere ulaznih podataka u HTML Manager sučelju, a napadaču omogućuje zaobilaženje postavljenih ograničenja te izvođenje XSS napada. Drugi je uzrokovan pogreškom u postavkama "ServletContect" značajke. Napadaču omogućuje neovlašteni pristup sustavu. Korisnicima se preporuča prelazak na ispravljene inačice.
Apache Tomcat Cross Site Scripting and Permission Bypass Vulnerabilities
VUPEN ID VUPEN/ADV-2011-0292
CVE ID CVE-2010-3718 - CVE-2011-0013
CWE ID Available in VUPEN VNS Customer Area
CVSS V2 Available in VUPEN VNS Customer Area
Rated as Moderate Risk
Impact Available in VUPEN VNS Customer Area
Authentication Level Available in VUPEN VNS Customer Area
Access Vector Available in VUPEN VNS Customer Area
Release Date 2011-02-07
Share Twitter LinkedIn Facebook Delicious Digg Slashdot
Technical Description
Two vulnerabilities have been identified in Apache Tomcat, which could be exploited to bypass restrictions or gain knowledge of sensitive information.
The first issue is caused by an input validation error in the HTML Manager interface when displaying web application data, which could allow cross site scripting attacks.
The second vulnerability is caused due to the read-only setting not being applied when running web applications under a SecurityManager, which could allow a malicious web application to gain unauthorized read and write access to a vulnerable system.
Affected Products
Apache Tomcat versions 7.x
Apache Tomcat versions 6.x
Apache Tomcat versions 5.x
Solution
Upgrade to Apache Tomcat version 7.0.6 or later, 6.0.30 or later, or 5.5.32 :
http://archive.apache.org/dist/tomcat
References
http://www.vupen.com/english/advisories/2011/0292
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-5.html
Credits
Vulnerabilities reported by the vendor.
Changelog
2011-02-07 : Initial release
Posljednje sigurnosne preporuke