7.8
CWE
276
Advisory Published
Advisory Published
Updated

CVE-2020-8022: User-writeable configuration file /usr/lib/tmpfiles.d/tomcat.conf allows for escalation of priviliges

First published: Fri Jun 26 2020(Updated: )

### Withdrawn As per https://lists.apache.org/thread/0z644xfjo49pn2oxcp9qslkvhhw4tb7q this issue only affects the SUSE built artifacts of tomcat and is not relevant for the artifacts on maven central. ### Original Advisory A Incorrect Default Permissions vulnerability in the packaging of tomcat on SUSE Enterprise Storage 5, SUSE Linux Enterprise Server 12-SP2-BCL, SUSE Linux Enterprise Server 12-SP2-LTSS, SUSE Linux Enterprise Server 12-SP3-BCL, SUSE Linux Enterprise Server 12-SP3-LTSS, SUSE Linux Enterprise Server 12-SP4, SUSE Linux Enterprise Server 12-SP5, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 12-SP2, SUSE Linux Enterprise Server for SAP 12-SP3, SUSE Linux Enterprise Server for SAP 15, SUSE OpenStack Cloud 7, SUSE OpenStack Cloud 8, SUSE OpenStack Cloud Crowbar 8 allows local attackers to escalate from group tomcat to root. This issue affects: SUSE Enterprise Storage 5 tomcat versions prior to 80.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP2-BCL tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP2-LTSS tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP3-BCL tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP3-LTSS tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP4 tomcat versions prior to 9.0.35-3.39.1. SUSE Linux Enterprise Server 12-SP5 tomcat versions prior to 9.0.35-3.39.1. SUSE Linux Enterprise Server 15-LTSS tomcat versions prior to 9.0.35-3.57.3. SUSE Linux Enterprise Server for SAP 12-SP2 tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server for SAP 12-SP3 tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server for SAP 15 tomcat versions prior to 9.0.35-3.57.3. SUSE OpenStack Cloud 7 tomcat versions prior to 8.0.53-29.32.1. SUSE OpenStack Cloud 8 tomcat versions prior to 8.0.53-29.32.1. SUSE OpenStack Cloud Crowbar 8 tomcat versions prior to 8.0.53-29.32.1.

Credit: meissner@suse.de meissner@suse.de

Affected SoftwareAffected VersionHow to fix
IBM QRadar SIEM<=7.5.0 GA
IBM QRadar SIEM<=7.4.3 GA - 7.4.3 FP4
IBM QRadar SIEM<=7.3.3 GA - 7.3.3 FP10
Apache Tomcat<8.0.53-29.32.1
SUSE Enterprise Storage=5.0
SUSE Linux Enterprise Server=12-sp2
SUSE Linux Enterprise Server=12-sp2
SUSE Linux Enterprise Server=12-sp3
SUSE Linux Enterprise Server=12-sp3
Suse Linux Enterprise Server Sap=12-sp2
Suse Linux Enterprise Server Sap=12-sp3
SUSE OpenStack Cloud=7.0
SUSE OpenStack Cloud=8.0
SUSE OpenStack Cloud Crowbar=8.0
Apache Tomcat<9.0.35-3.39.1
SUSE Linux Enterprise Server=12-sp4
SUSE Linux Enterprise Server=12-sp5
Apache Tomcat<9.0.35-3.57.3
Suse Linux Enterprise Server Sap=15
openSUSE Leap=15.1
maven/org.apache.tomcat:tomcat>=9.0.0<9.0.35
9.0.35
maven/org.apache.tomcat:tomcat<8.0.53
8.0.53
All of
Apache Tomcat<8.0.53-29.32.1
SUSE Enterprise Storage=5.0
All of
Apache Tomcat<8.0.53-29.32.1
SUSE Linux Enterprise Server=12-sp2
All of
Apache Tomcat<8.0.53-29.32.1
SUSE Linux Enterprise Server=12-sp2
All of
Apache Tomcat<8.0.53-29.32.1
SUSE Linux Enterprise Server=12-sp3
All of
Apache Tomcat<8.0.53-29.32.1
SUSE Linux Enterprise Server=12-sp3
All of
Apache Tomcat<8.0.53-29.32.1
Suse Linux Enterprise Server Sap=12-sp2
All of
Apache Tomcat<8.0.53-29.32.1
Suse Linux Enterprise Server Sap=12-sp3
All of
Apache Tomcat<8.0.53-29.32.1
SUSE OpenStack Cloud=7.0
All of
Apache Tomcat<8.0.53-29.32.1
SUSE OpenStack Cloud=8.0
All of
Apache Tomcat<8.0.53-29.32.1
SUSE OpenStack Cloud Crowbar=8.0
All of
Apache Tomcat<9.0.35-3.39.1
SUSE Linux Enterprise Server=12-sp4
All of
Apache Tomcat<9.0.35-3.39.1
SUSE Linux Enterprise Server=12-sp5
All of
Apache Tomcat<9.0.35-3.57.3
Suse Linux Enterprise Server Sap=15

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is the vulnerability ID for this vulnerability?

    The vulnerability ID for this vulnerability is CVE-2020-8022.

  • What is the severity level of CVE-2020-8022?

    The severity level of CVE-2020-8022 is high.

  • Which software packages are affected by CVE-2020-8022?

    The affected software packages include tomcat on SUSE Enterprise Storage 5, SUSE Linux Enterprise Server 12-SP2-BCL, SUSE Linux Enterprise Server 12-SP2-LTSS, SUSE Linux Enterprise Server 12-SP3-BCL, SUSE Linux Enterprise Server 12-SP3-LTSS, SUSE Linux Enterprise Server 12-SP2-LTSS, and SUSE Linux Enterprise Server 12-SP3-LTSS.

  • How can a local authenticated attacker exploit CVE-2020-8022?

    A local authenticated attacker can exploit CVE-2020-8022 to gain elevated privileges.

  • Is there a patch available to fix CVE-2020-8022?

    Yes, there is a patch available to fix CVE-2020-8022.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203