F5 Networks BIG-IP : Apache Tomcat 6.x vulnerability (K18174924)

medium Nessus Plugin ID 107135

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 does not place org.apache.catalina.manager.StatusManagerServlet on the org/apache/catalina/core/RestrictedServlets.properties list, which allows remote authenticated users to bypass intended SecurityManager restrictions and read arbitrary HTTP requests, and consequently discover session ID values, via a crafted web application.
(CVE-2016-0706)

Impact

When this vulnerability is exploited via crafted web application, a remote authenticated user may bypass the intended security manager restrictions, read arbitrary HTTP requests, and discover session ID values.

BIG-IP/Enterprise Manager

BIG-IP and Enterprise Manager systems do not use the affected feature.
The vulnerable software is present; however, the software is not used in a way that exposes this vulnerability. BIG-IP and Enterprise Manager systems are only vulnerable if you manually enable the feature by setting the SECURITY_MANAGER directive to true in the /etc/tomcat/tomcat.conf file.

Traffix SDC Exploitation of this vulnerability may occur if an attacker has access to the local network of the system; the Tomcat service is accessible only from the internal network.

Solution

Upgrade to one of the non-vulnerable versions listed in the F5 Solution K18174924.

See Also

https://support.f5.com/csp/article/K18174924

Plugin Details

Severity: Medium

ID: 107135

File Name: f5_bigip_SOL18174924.nasl

Version: 3.3

Type: local

Published: 3/6/2018

Updated: 3/18/2020

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 2.2

CVSS v2

Risk Factor: Medium

Base Score: 4

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:N/A:N

CVSS v3

Risk Factor: Medium

Base Score: 4.3

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Vulnerability Information

CPE: cpe:/a:f5:big-ip_access_policy_manager, cpe:/a:f5:big-ip_advanced_firewall_manager, cpe:/a:f5:big-ip_application_acceleration_manager, cpe:/a:f5:big-ip_application_security_manager, cpe:/a:f5:big-ip_application_visibility_and_reporting, cpe:/a:f5:big-ip_global_traffic_manager, cpe:/a:f5:big-ip_link_controller, cpe:/a:f5:big-ip_local_traffic_manager, cpe:/a:f5:big-ip_policy_enforcement_manager, cpe:/a:f5:big-ip_wan_optimization_manager, cpe:/a:f5:big-ip_webaccelerator, cpe:/h:f5:big-ip, cpe:/h:f5:big-ip_protocol_security_manager

Required KB Items: Host/local_checks_enabled, Host/BIG-IP/hotfix, Host/BIG-IP/modules, Host/BIG-IP/version

Patch Publication Date: 3/5/2018

Vulnerability Publication Date: 2/25/2016

Reference Information

CVE: CVE-2016-0706