Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS : Tomcat vulnerabilities (USN-3665-1)

critical Nessus Plugin ID 110264

Synopsis

The remote Ubuntu host is missing one or more security updates.

Description

It was discovered that Tomcat incorrectly handled being configured with HTTP PUTs enabled. A remote attacker could use this issue to upload a JSP file to the server and execute arbitrary code. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS and Ubuntu 17.10.
(CVE-2017-12616, CVE-2017-12617)

It was discovered that Tomcat contained incorrect documentation regarding description of the search algorithm used by the CGI Servlet to identify which script to execute. This issue only affected Ubuntu 17.10. (CVE-2017-15706)

It was discovered that Tomcat incorrectly handled en empty string URL pattern in security constraint definitions. A remote attacker could possibly use this issue to gain access to web application resources, contrary to expectations. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS and Ubuntu 17.10. (CVE-2018-1304)

It was discovered that Tomcat incorrectly handled applying certain security constraints. A remote attacker could possibly access certain resources, contrary to expectations. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS and Ubuntu 17.10. (CVE-2018-1305)

It was discovered that the Tomcat CORS filter default settings were insecure and would enable 'supportsCredentials' for all origins, contrary to expectations. (CVE-2018-8014).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Update the affected packages.

See Also

https://ubuntu.com/security/notices/USN-3665-1

Plugin Details

Severity: Critical

ID: 110264

File Name: ubuntu_USN-3665-1.nasl

Version: 1.22

Type: local

Agent: unix

Published: 5/31/2018

Updated: 10/20/2023

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.2

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2018-8014

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:canonical:ubuntu_linux:libtomcat7-java, p-cpe:/a:canonical:ubuntu_linux:libtomcat8-embed-java, p-cpe:/a:canonical:ubuntu_linux:libtomcat8-java, p-cpe:/a:canonical:ubuntu_linux:tomcat7, p-cpe:/a:canonical:ubuntu_linux:tomcat7-admin, p-cpe:/a:canonical:ubuntu_linux:tomcat7-common, p-cpe:/a:canonical:ubuntu_linux:tomcat7-examples, p-cpe:/a:canonical:ubuntu_linux:tomcat7-user, p-cpe:/a:canonical:ubuntu_linux:tomcat8, p-cpe:/a:canonical:ubuntu_linux:tomcat8-admin, p-cpe:/a:canonical:ubuntu_linux:tomcat8-common, p-cpe:/a:canonical:ubuntu_linux:tomcat8-examples, p-cpe:/a:canonical:ubuntu_linux:tomcat8-user, cpe:/o:canonical:ubuntu_linux:14.04:-:lts, cpe:/o:canonical:ubuntu_linux:16.04:-:lts, cpe:/o:canonical:ubuntu_linux:18.04:-:lts, p-cpe:/a:canonical:ubuntu_linux:libservlet3.0-java, p-cpe:/a:canonical:ubuntu_linux:libservlet3.1-java

Required KB Items: Host/cpu, Host/Ubuntu, Host/Ubuntu/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/30/2018

Vulnerability Publication Date: 9/19/2017

CISA Known Exploited Vulnerability Due Dates: 4/15/2022

Exploitable With

Core Impact

Metasploit (Tomcat RCE via JSP Upload Bypass)

Elliot (Apache Tomcat VirtualDirContext Class File Handling Remote JSP Source Code Disclosure)

Reference Information

CVE: CVE-2017-12616, CVE-2017-12617, CVE-2017-15706, CVE-2018-1304, CVE-2018-1305, CVE-2018-8014

USN: 3665-1