SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Database)  >   CouchDB Vendors:   Apache Software Foundation
(Apache Issues Fix for CouchDB) Tomcat RequestDispatcher Bug Lets Remote Users Bypass Access Restrictions
SecurityTracker Alert ID:  1023800
SecurityTracker URL:  http://securitytracker.com/id/1023800
CVE Reference:   CVE-2008-2370   (Links to External Site)
Date:  Mar 31 2010
Impact:   Disclosure of system information, Disclosure of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 0.11.0
Description:   A vulnerability was reported in Tomcat. A remote user can bypass certain access restriction. Apache CouchDB is affected.

When a RequestDispatcher is used, a remote user can submit a specially crafted request to access content that is ostensibly protected by a security constraint or by its location under the WEB-INF directory.

Stefano Di Paola of Minded Security Research Labs reported this vulnerability.

Impact:   A remote user can bypass certain security restrictions to access content that is ostensibly protected.
Solution:   Apache has issued a fix for CouchDB (0.11.0).
Vendor URL:  tomcat.apache.org/security.html (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry is a follow-up to the message listed below.
Aug 4 2008 Tomcat RequestDispatcher Bug Lets Remote Users Bypass Access Restrictions



 Source Message Contents

Subject:  [SECURITY] CVE-2008-2370: Apache CouchDB Timing Attack Vulnerability

CVE-2008-2370: Apache CouchDB Timing Attack Vulnerability

Severity: Important

Vendor:
The Apache Software Foundation

Versions Affected:
Apache CouchDB 0.8.0 to 0.10.1

Description:
Apache CouchDB versions prior to version 0.11.0 are vulnerable to
timing attacks, also known as side-channel information leakage,
due to using simple break-on-inequality string comparisons when
verifying hashes and passwords.

Mitigation:
All users should upgrade to CouchDB 0.11.0. Upgrades from the 0.10.x
series should be seamless. Users on earlier versions should consult

 http://wiki.apache.org/couchdb/Breaking_changes

Example:
A canonical description of the attack can be found in

 http://codahale.com/a-lesson-in-timing-attacks/

Credit:
This issue was discovered by Jason Davies of the Apache CouchDB 
development team.

References:
http://couchdb.apache.org/
http://couchdb.apache.org/downloads.html
http://wiki.apache.org/couchdb/Breaking_changes
http://codahale.com/a-lesson-in-timing-attacks/

Jan Lehnardt
--

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC