SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Server/CGI)  >   Apache Tomcat Vendors:   Apache Software Foundation
Apache Tomcat Default Servlet Error Handling Bug May Let Remote Users Bypass HTTP Method Restrictions on the Target Error Page
SecurityTracker Alert ID:  1038641
SecurityTracker URL:  http://securitytracker.com/id/1038641
CVE Reference:   CVE-2017-5664   (Links to External Site)
Updated:  Jun 23 2017
Original Entry Date:  Jun 8 2017
Impact:   Modification of system information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 7.0.0 to 7.0.77, 8.0.0.RC1 to 8.0.43, 8.5.0 to 8.5.14, 9.0.0.M1 to 9.0.0.M20
Description:   A vulnerability was reported in Apache Tomcat. A remote user can bypass security controls on the target system.

The Default Servlet error page mechanism does not properly handle certain HTTP request methods for static error pages. As a result, a remote user may be able to bypass HTTP method restrictions and cause unexpected actions to occur for static error pages, potentially including the deletion or replacement of the target error page.

Aniket Nandkishor Kulkarni from Tata Consultancy Services Ltd, Mumbai, India reported this vulnerability.

Impact:   A remote user may be able to cause a target error page to be deleted or replaced.
Solution:   The vendor has issued a fix (7.0.78, 8.0.44, 8.5.15, 9.0.0.M21).

The vendor advisories are available at:

http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-9.html

Vendor URL:  tomcat.apache.org/security-9.html (Links to External Site)
Cause:   Access control error, State error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Jul 25 2017 (Red Hat Issues Fix for Red Hat JBoss Web Server) Apache Tomcat Default Servlet Error Handling Bug May Let Remote Users Bypass HTTP Method Restrictions on the Target Error Page
Red Hat has issued a fix for Red Hat JBoss Web Server for Red Hat Enterprise Linux 6 and 7.
Jul 27 2017 (Red Hat Issues Fix) Apache Tomcat Default Servlet Error Handling Bug May Let Remote Users Bypass HTTP Method Restrictions on the Target Error Page
Red Hat has issued a fix for Red Hat Enterprise Linux 7.
Jul 27 2017 (CentOS Issues Fix) Apache Tomcat Default Servlet Error Handling Bug May Let Remote Users Bypass HTTP Method Restrictions on the Target Error Page
CentOS has issued a fix for CentOS 7.
Jul 28 2017 (Oracle Issues Fix for Oracle Linux) Apache Tomcat Default Servlet Error Handling Bug May Let Remote Users Bypass HTTP Method Restrictions on the Target Error Page
Oracle has issued a fix for Oracle Linux 7.
Oct 30 2017 (Red Hat Issues Fix) Apache Tomcat Default Servlet Error Handling Bug May Let Remote Users Bypass HTTP Method Restrictions on the Target Error Page
Red Hat has issued a fix for Red Hat Enterprise Linux 6.
Jan 8 2018 (Ubuntu Issues Fix) Apache Tomcat Default Servlet Error Handling Bug May Let Remote Users Bypass HTTP Method Restrictions on the Target Error Page
Ubuntu has issued a fix for Ubuntu Linux 14.04 LTS, 16.04 LTS, and 17.04.
Mar 13 2018 (HPE Issues Fix for HP-UX) Apache Tomcat Default Servlet Error Handling Bug May Let Remote Users Bypass HTTP Method Restrictions on the Target Error Page
HPE has issued a fix for the HP-UX Tomcat-based Servlet Engine.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC