First published: Wed Nov 13 2013(Updated: )
** DISPUTED ** Cross-site request forgery (CSRF) vulnerability in the Manager application in Apache Tomcat 5.5.25 and earlier allows remote attackers to hijack the authentication of administrators for requests that manipulate application deployment via the POST method, as demonstrated by a /manager/html/undeploy?path= URI. NOTE: the vendor disputes the significance of this report, stating that "the Apache Tomcat Security team has not accepted any reports of CSRF attacks against the Manager application ... as they require a reckless system administrator."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tomcat | <=5.5.25 | |
Tomcat | =1.1.3 | |
Tomcat | =3.0 | |
Tomcat | =3.1 | |
Tomcat | =3.1.1 | |
Tomcat | =3.2 | |
Tomcat | =3.2.1 | |
Tomcat | =3.2.2 | |
Tomcat | =3.2.2-beta2 | |
Tomcat | =3.2.3 | |
Tomcat | =3.2.4 | |
Tomcat | =3.3 | |
Tomcat | =3.3.1 | |
Tomcat | =3.3.1a | |
Tomcat | =3.3.2 | |
Tomcat | =4 | |
Tomcat | =4.0.0 | |
Tomcat | =4.0.1 | |
Tomcat | =4.0.2 | |
Tomcat | =4.0.3 | |
Tomcat | =4.0.4 | |
Tomcat | =4.0.5 | |
Tomcat | =4.0.6 | |
Tomcat | =4.1.0 | |
Tomcat | =4.1.1 | |
Tomcat | =4.1.2 | |
Tomcat | =4.1.3 | |
Tomcat | =4.1.3-beta | |
Tomcat | =4.1.9-beta | |
Tomcat | =4.1.10 | |
Tomcat | =4.1.12 | |
Tomcat | =4.1.15 | |
Tomcat | =4.1.24 | |
Tomcat | =4.1.28 | |
Tomcat | =4.1.29 | |
Tomcat | =4.1.31 | |
Tomcat | =4.1.36 | |
Tomcat | =5 | |
Tomcat | =5.0.0 | |
Tomcat | =5.0.1 | |
Tomcat | =5.0.2 | |
Tomcat | =5.0.3 | |
Tomcat | =5.0.4 | |
Tomcat | =5.0.5 | |
Tomcat | =5.0.6 | |
Tomcat | =5.0.7 | |
Tomcat | =5.0.8 | |
Tomcat | =5.0.9 | |
Tomcat | =5.0.10 | |
Tomcat | =5.0.11 | |
Tomcat | =5.0.12 | |
Tomcat | =5.0.13 | |
Tomcat | =5.0.14 | |
Tomcat | =5.0.15 | |
Tomcat | =5.0.16 | |
Tomcat | =5.0.17 | |
Tomcat | =5.0.18 | |
Tomcat | =5.0.19 | |
Tomcat | =5.0.21 | |
Tomcat | =5.0.22 | |
Tomcat | =5.0.23 | |
Tomcat | =5.0.24 | |
Tomcat | =5.0.25 | |
Tomcat | =5.0.26 | |
Tomcat | =5.0.27 | |
Tomcat | =5.0.28 | |
Tomcat | =5.0.29 | |
Tomcat | =5.0.30 | |
Tomcat | =5.5.0 | |
Tomcat | =5.5.1 | |
Tomcat | =5.5.2 | |
Tomcat | =5.5.3 | |
Tomcat | =5.5.4 | |
Tomcat | =5.5.5 | |
Tomcat | =5.5.6 | |
Tomcat | =5.5.7 | |
Tomcat | =5.5.8 | |
Tomcat | =5.5.9 | |
Tomcat | =5.5.10 | |
Tomcat | =5.5.11 | |
Tomcat | =5.5.12 | |
Tomcat | =5.5.13 | |
Tomcat | =5.5.14 | |
Tomcat | =5.5.15 | |
Tomcat | =5.5.16 | |
Tomcat | =5.5.17 | |
Tomcat | =5.5.18 | |
Tomcat | =5.5.19 | |
Tomcat | =5.5.20 | |
Tomcat | =5.5.21 | |
Tomcat | =5.5.22 | |
Tomcat | =5.5.23 | |
Tomcat | =5.5.24 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6357 is considered a medium severity vulnerability due to its potential to enable attackers to hijack administrator authentication.
To fix CVE-2013-6357, upgrade Apache Tomcat to version 5.5.26 or later, where this vulnerability is addressed.
CVE-2013-6357 affects Apache Tomcat versions up to 5.5.25, as well as several earlier versions.
CVE-2013-6357 is a Cross-Site Request Forgery (CSRF) vulnerability.
Yes, CVE-2013-6357 can allow attackers to manipulate application deployment by hijacking administrator sessions.