F5 Networks BIG-IP : Apache Tomcat 6.x vulnerabilities (K58084500)

Medium Nessus Plugin ID 107137

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 5.9

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

The session-persistence implementation in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 mishandles session attributes, which allows remote authenticated users to bypass intended SecurityManager restrictions and execute arbitrary code in a privileged context via a web application that places a crafted object in a session. (CVE-2016-0714)

Impact

A remote authenticated user may bypass the intended security manager restrictions and execute arbitrary code in a privileged context by exploiting this vulnerability via a web application that places a crafted object in a session.

BIG-IP/Enterprise Manager

BIG-IP and Enterprise Manager systems do not use the affected feature.
The vulnerable software is present; however, the software is not used in a way that exposes this vulnerability.

Traffix SDC Exploitation of this vulnerability may occur if an attacker has access to the local network of the system; the Tomcat service is accessible only from the internal network.

Solution

Upgrade to one of the non-vulnerable versions listed in the F5 Solution K58084500.

See Also

https://support.f5.com/csp/article/K58084500

Plugin Details

Severity: Medium

ID: 107137

File Name: f5_bigip_SOL58084500.nasl

Version: 3.3

Type: local

Published: 2018/03/06

Updated: 2020/03/16

Dependencies: 76940

Risk Information

Risk Factor: Medium

VPR Score: 5.9

CVSS v2.0

Base Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS v3.0

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/a:f5:big-ip_access_policy_manager, cpe:/a:f5:big-ip_advanced_firewall_manager, cpe:/a:f5:big-ip_application_acceleration_manager, cpe:/a:f5:big-ip_application_security_manager, cpe:/a:f5:big-ip_application_visibility_and_reporting, cpe:/a:f5:big-ip_global_traffic_manager, cpe:/a:f5:big-ip_link_controller, cpe:/a:f5:big-ip_local_traffic_manager, cpe:/a:f5:big-ip_policy_enforcement_manager, cpe:/a:f5:big-ip_wan_optimization_manager, cpe:/a:f5:big-ip_webaccelerator, cpe:/h:f5:big-ip, cpe:/h:f5:big-ip_protocol_security_manager

Required KB Items: Host/local_checks_enabled, Host/BIG-IP/hotfix, Host/BIG-IP/modules, Host/BIG-IP/version

Patch Publication Date: 2018/03/05

Vulnerability Publication Date: 2016/02/25

Reference Information

CVE: CVE-2016-0714