Apache Tomcat Security Bypass Vulnerability (CVE-2018-1305)

Source: Internet
Author: User
Tags cve

Apache Tomcat Security Bypass Vulnerability (CVE-2018-1305)
Apache Tomcat Security Bypass Vulnerability (CVE-2018-1305)


Release date:
Updated on:

Affected Systems:

Apache Group Tomcat 9.0.0.M1-9.0.4
Apache Group Tomcat 8.5.0-8.5.27
Apache Group Tomcat 8.0.0.RC1-8.0.49
Apache Group Tomcat 7.0.0-7.0.84

Description:

Bugtraq id: 103144
CVE (CAN) ID: CVE-2018-1305

Apache Tomcat is a popular open-source JSP application server program.

Apache Tomcat 7, 8, and 9 versions have the Security Bypass Vulnerability. Attackers can exploit this vulnerability to bypass certain security restrictions to perform unauthorized operations, which may facilitate further attacks.

<* Source: vendor

Link: https://securitytracker.com/id/1040428
Http://blog.nsfocus.net/cve-2018-130-handling/
*>

Suggestion:

Temporary solution:

If you cannot install or upgrade the patch immediately, NSFOCUS recommends that you take the following measures to reduce the threat:

* To trigger this vulnerability, you must first access the sub-path "/servlet1/servlet2" before accessing the parent path "/servlet1" after tomcat is started ", as a result, the ACL protection for servlet1 is not inherited by servlet2. If servlet1 is accessed first, Tomcat loads the ACL and protects servlet2. In combination with the features of this vulnerability, You can manually access "/servlet1" to force Tomcat to load the ACL. As long as Tomcat does not restart, the ACL protection will always take effect.
Ask the relevant users to evaluate whether the parent path "/servlet1" can be accessed manually based on the specific functions of their business systems. For details about this vulnerability, refer to the "Green Alliance technology blog ".

Vendor patch:

Apache Group
------------
Apache has fixed this vulnerability in the latest versions of Apache Tomcat 9.0.5, 8.5.28, 8.0.50, and 7.0.85. Upgrade affected users as soon as possible. For the Latest Version Download link, refer to the following list, you can download the corresponding installation package according to the specific system environment:

Version
Download link
Apache Tomcat 9.0.5
Https://tomcat.apache.org/download-90.cgi

Apache Tomcat 8.5.28
Https://tomcat.apache.org/download-80.cgi

Apache Tomcat 8.0.50
Https://tomcat.apache.org/download-80.cgi

Apache Tomcat 7.0.85
Https://tomcat.apache.org/download-70.cgi

Note: We recommend that you back up your data and operating environment before the upgrade to prevent the risk of system unavailability caused by the upgrade.

This article permanently updates link: https://www.bkjia.com/Linux/2018-03/151205.htm

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.