SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Web Server/CGI)  >   Apache Tomcat Vendors:   Apache Software Foundation
Apache Tomcat Default Servlet Error Handling Bug May Let Remote Users Bypass HTTP Method Restrictions on the Target Error Page
SecurityTracker Alert ID:  1038641
SecurityTracker URL:  http://securitytracker.com/id/1038641
CVE Reference:   CVE-2017-5664   (Links to External Site)
Updated:  Jun 23 2017
Original Entry Date:  Jun 8 2017
Impact:   Modification of system information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 7.0.0 to 7.0.77, 8.0.0.RC1 to 8.0.43, 8.5.0 to 8.5.14, 9.0.0.M1 to 9.0.0.M20
Description:   A vulnerability was reported in Apache Tomcat. A remote user can bypass security controls on the target system.

The Default Servlet error page mechanism does not properly handle certain HTTP request methods for static error pages. As a result, a remote user may be able to bypass HTTP method restrictions and cause unexpected actions to occur for static error pages, potentially including the deletion or replacement of the target error page.

Aniket Nandkishor Kulkarni from Tata Consultancy Services Ltd, Mumbai, India reported this vulnerability.

Impact:   A remote user may be able to cause a target error page to be deleted or replaced.
Solution:   The vendor has issued a fix (7.0.78, 8.0.44, 8.5.15, 9.0.0.M21).

The vendor advisories are available at:

http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-9.html

Vendor URL:  tomcat.apache.org/security-9.html (Links to External Site)
Cause:   Access control error, State error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Jul 25 2017 (Red Hat Issues Fix for Red Hat JBoss Web Server) Apache Tomcat Default Servlet Error Handling Bug May Let Remote Users Bypass HTTP Method Restrictions on the Target Error Page
Red Hat has issued a fix for Red Hat JBoss Web Server for Red Hat Enterprise Linux 6 and 7.
Jul 27 2017 (Red Hat Issues Fix) Apache Tomcat Default Servlet Error Handling Bug May Let Remote Users Bypass HTTP Method Restrictions on the Target Error Page
Red Hat has issued a fix for Red Hat Enterprise Linux 7.
Jul 27 2017 (CentOS Issues Fix) Apache Tomcat Default Servlet Error Handling Bug May Let Remote Users Bypass HTTP Method Restrictions on the Target Error Page
CentOS has issued a fix for CentOS 7.
Jul 28 2017 (Oracle Issues Fix for Oracle Linux) Apache Tomcat Default Servlet Error Handling Bug May Let Remote Users Bypass HTTP Method Restrictions on the Target Error Page
Oracle has issued a fix for Oracle Linux 7.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2017, SecurityGlobal.net LLC