Mandriva Linux Security Advisory : tomcat5 (MDVSA-2008:188)

medium Nessus Plugin ID 36926

Synopsis

The remote Mandriva Linux host is missing one or more security updates.

Description

A number of vulnerabilities have been discovered in the Apache Tomcat server :

The default catalina.policy in the JULI logging component did not restrict certain permissions for web applications which could allow a remote attacker to modify logging configuration options and overwrite arbitrary files (CVE-2007-5342).

A cross-site scripting vulnerability was found in the HttpServletResponse.sendError() method which could allow a remote attacker to inject arbitrary web script or HTML via forged HTTP headers (CVE-2008-1232).

A cross-site scripting vulnerability was found in the host manager application that could allow a remote attacker to inject arbitrary web script or HTML via the hostname parameter (CVE-2008-1947).

A traversal vulnerability was found when using a RequestDispatcher in combination with a servlet or JSP that could allow a remote attacker to utilize a specially crafted request parameter to access protected web resources (CVE-2008-2370).

A traversal vulnerability was found when the 'allowLinking' and 'URIencoding' settings were actived which could allow a remote attacker to use a UTF-8-encoded request to extend their privileges and obtain local files accessible to the Tomcat process (CVE-2008-2938).

The updated packages have been patched to correct these issues.

Solution

Update the affected packages.

Plugin Details

Severity: Medium

ID: 36926

File Name: mandriva_MDVSA-2008-188.nasl

Version: 1.19

Type: local

Published: 4/23/2009

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:tomcat5, p-cpe:/a:mandriva:linux:tomcat5-admin-webapps, p-cpe:/a:mandriva:linux:tomcat5-common-lib, p-cpe:/a:mandriva:linux:tomcat5-jasper, p-cpe:/a:mandriva:linux:tomcat5-jasper-eclipse, p-cpe:/a:mandriva:linux:tomcat5-jasper-javadoc, p-cpe:/a:mandriva:linux:tomcat5-jsp-2.0-api, p-cpe:/a:mandriva:linux:tomcat5-jsp-2.0-api-javadoc, p-cpe:/a:mandriva:linux:tomcat5-server-lib, p-cpe:/a:mandriva:linux:tomcat5-servlet-2.4-api, p-cpe:/a:mandriva:linux:tomcat5-servlet-2.4-api-javadoc, p-cpe:/a:mandriva:linux:tomcat5-webapps, cpe:/o:mandriva:linux:2008.0, cpe:/o:mandriva:linux:2008.1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/5/2008

Exploitable With

CANVAS (D2ExploitPack)

Elliot (Apache Tomcat File Disclosure)

Reference Information

CVE: CVE-2007-5342, CVE-2008-1232, CVE-2008-1947, CVE-2008-2370, CVE-2008-2938

CWE: 22, 264, 79

MDVSA: 2008:188