CWE
79
Advisory Published

RHSA-2009:1562: Important: tomcat security update

First published: Mon Nov 09 2009(Updated: )

Apache Tomcat is a servlet container for the Java Servlet and JavaServer<br>Pages (JSP) technologies.<br>It was discovered that the Red Hat Security Advisory RHSA-2007:0876 did not<br>address all possible flaws in the way Tomcat handles certain characters and<br>character sequences in cookie values. A remote attacker could use this flaw<br>to obtain sensitive information, such as session IDs, and then use this<br>information for session hijacking attacks. (CVE-2007-5333)<br>Note: The fix for the CVE-2007-5333 flaw changes the default cookie<br>processing behavior: With this update, version 0 cookies that contain<br>values that must be quoted to be valid are automatically changed to version<br>1 cookies. To reactivate the previous, but insecure behavior, add the<br>following entry to the "/etc/tomcat5/catalina.properties" file:<br>org.apache.tomcat.util.http.ServerCookie.VERSION_SWITCH=false<br>It was discovered that request dispatchers did not properly normalize user<br>requests that have trailing query strings, allowing remote attackers to<br>send specially-crafted requests that would cause an information leak.<br>(CVE-2008-5515)<br>A flaw was found in the way the Tomcat AJP (Apache JServ Protocol)<br>connector processes AJP connections. An attacker could use this flaw to<br>send specially-crafted requests that would cause a temporary denial of<br>service. (CVE-2009-0033)<br>It was discovered that the error checking methods of certain authentication<br>classes did not have sufficient error checking, allowing remote attackers<br>to enumerate (via brute force methods) usernames registered with<br>applications running on Tomcat when FORM-based authentication was used.<br>(CVE-2009-0580)<br>A cross-site scripting (XSS) flaw was found in the examples calendar<br>application. With some web browsers, remote attackers could use this flaw<br>to inject arbitrary web script or HTML via the "time" parameter.<br>(CVE-2009-0781)<br>It was discovered that web applications containing their own XML parsers<br>could replace the XML parser Tomcat uses to parse configuration files. A<br>malicious web application running on a Tomcat instance could read or,<br>potentially, modify the configuration and XML-based data of other web<br>applications deployed on the same Tomcat instance. (CVE-2009-0783)<br>Users of Tomcat should upgrade to these updated packages, which contain<br>backported patches to resolve these issues. Tomcat must be restarted for<br>this update to take effect.

Affected SoftwareAffected VersionHow to fix

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203