Apache Tomcat Default Servlet Error Handling Bug May Let Remote Users Bypass HTTP Method Restrictions on the Target Error Page
|
SecurityTracker Alert ID: 1038641 |
SecurityTracker URL: http://securitytracker.com/id/1038641
|
CVE Reference:
CVE-2017-5664
(Links to External Site)
|
Updated: Jun 23 2017
|
Original Entry Date: Jun 8 2017
|
Impact:
Modification of system information
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 7.0.0 to 7.0.77, 8.0.0.RC1 to 8.0.43, 8.5.0 to 8.5.14, 9.0.0.M1 to 9.0.0.M20
|
Description:
A vulnerability was reported in Apache Tomcat. A remote user can bypass security controls on the target system.
The Default Servlet error page mechanism does not properly handle certain HTTP request methods for static error pages. As a result, a remote user may be able to bypass HTTP method restrictions and cause unexpected actions to occur for static error pages, potentially including the deletion or replacement of the target error page.
Aniket Nandkishor Kulkarni from Tata Consultancy Services Ltd, Mumbai, India reported this vulnerability.
|
Impact:
A remote user may be able to cause a target error page to be deleted or replaced.
|
Solution:
The vendor has issued a fix (7.0.78, 8.0.44, 8.5.15, 9.0.0.M21).
The vendor advisories are available at:
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-9.html
|
Vendor URL: tomcat.apache.org/security-9.html (Links to External Site)
|
Cause:
Access control error, State error
|
Underlying OS: Linux (Any), UNIX (Any), Windows (Any)
|
|
Message History:
This archive entry has one or more follow-up message(s) listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|