F5 Networks BIG-IP : Apache Tomcat 6.x vulnerability (K18174924)
Medium Nessus Plugin ID 107135
SynopsisThe remote device is missing a vendor-supplied security patch.
DescriptionApache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 does not place org.apache.catalina.manager.StatusManagerServlet on the org/apache/catalina/core/RestrictedServlets.properties list, which allows remote authenticated users to bypass intended SecurityManager restrictions and read arbitrary HTTP requests, and consequently discover session ID values, via a crafted web application.
When this vulnerability is exploited via crafted web application, a remote authenticated user may bypass the intended security manager restrictions, read arbitrary HTTP requests, and discover session ID values.
BIG-IP and Enterprise Manager systems do not use the affected feature.
The vulnerable software is present; however, the software is not used in a way that exposes this vulnerability.
Traffix SDC Exploitation of this vulnerability may occur if an attacker has access to the local network of the system; the Tomcat service is accessible only from the internal network.
SolutionUpgrade to one of the non-vulnerable versions listed in the F5 Solution K18174924.