ESB-2018.2992 - [Win][UNIX/Linux] Apache Tomcat: Provide misleading information - Remote with user interaction 2018-10-04

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.2992
                       Apache Tomcat - Open Redirect
                              4 October 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Apache Tomcat
Publisher:         Apache
Operating System:  UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Provide Misleading Information -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-11784  

Original Bulletin: 
   http://tomcat.apache.org/security-9.html
   http://tomcat.apache.org/security-8.html
   http://tomcat.apache.org/security-7.html

- --------------------------BEGIN INCLUDED TEXT--------------------

CVE-2018-11784 Apache Tomcat - Open Redirect

Severity: Moderate

Vendor: The Apache Software Foundation

Versions Affected:
Apache Tomcat 9.0.0.M1 to 9.0.11
Apache Tomcat 8.5.0 to 8.5.33
Apache Tomcat 7.0.23 to 7.0.90
The unsupported 8.0.x release line has not been analysed but is likely
to be affected.

Description:
When the default servlet returned a redirect to a directory (e.g.
redirecting to '/foo/' when the user requested '/foo') a specially
crafted URL could be used to cause the redirect to be generated to any
URI of the attackers choice.

Mitigation:
Users of the affected versions should apply one of the following
mitigations:
- - Upgrade to Apache Tomcat 9.0.12 or later.
- - Upgrade to Apache Tomcat 8.5.34 or later.
- - Upgrade to Apache Tomcat 7.0.91 or later.
- - Use mapperDirectoryRedirectEnabled="true" and
  mapperContextRootRedirectEnabled="true" on the Context to ensure that
  redirects are issued by the Mapper rather than the default Servlet.
  See the Context configuration documentation for further important
  details.

Credit:
This vulnerability was found by Sergey Bobrov and reported responsibly
to the Apache Tomcat Security Team.

History:
2018-10-03 Original advisory

References:
[1] http://tomcat.apache.org/security-9.html
[2] http://tomcat.apache.org/security-8.html
[3] http://tomcat.apache.org/security-7.html

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBW7WODGaOgq3Tt24GAQhEbg//VZ2GQKBSEUL591n4CucKk+AXt9smqWaa
R4f5R2yH7y24x/munX5cqrTgZVNKZzeotaLJoL8SRn8Z1iMSM+kiyuQ3K4Of2NQP
oPHb7tLSFpI5CliNCkFhtphx/iQ8J1+90O3HSB4QF0Zg4OqEG8TjxIx/NYa8hOQK
7vtLSHeIvE1z4hrZZjv7l1EskyX3zAawRB8LPbRyaINK43jE+hvkeHDByhdkppmH
NV7ivoAFpagdYRAiKFePZBSFGWDb/lEuxfTjrrfBGA46LuJJ4Beln2CoFacrRUdm
mSuoRWNqr04YLeKa+vsHe4hOyUM9OUE5u5M9KctnCodgFt9LZtSE6tTRSHuHDNJw
Z8XQHIz4wb6GEf/WM/yJoRGiMeURG03eq+ekU7pmGdkn2ZCTLoBgJSUh6V8Tk3UJ
51SwiueVAIszNfqWqlTsZuOKdOtF2JMet7gi5Xj8x2y/dMyQRjMvj+s9CCVok7Zp
nen1HCLoYBbd9BE2T9gOd10jrU4b/GZPqtRnUPQUNRLmAc8+fNIt50DdyOBQ2jHV
BWnhrBmlmtiP4R6iebVi7gYa9zyBacM5cS1mMk9FdemxyFsb8inF4dvlm7mZ4moT
5gVsrd/ANYFi8G9ZD9sQbE18xEz6J1hQArQ96OMi+NkPxvvoDk42v2x2t3jxvzYX
SRxcHMYE8LQ=
=lRSa
-----END PGP SIGNATURE-----

« Back to bulletins