copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

ESB-2016.0769 - [Appliance][Virtual] F5 products: Multiple vulnerabilities

Date: 23 March 2016
References: ESB-2016.0440  ESB-2016.0765  ESB-2016.0776  ESB-2016.1261  ESB-2016.1768  ESB-2016.2623  

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.0769
              SOL30971148: Apache Tomcat 6.x vulnerabilities
             CVE-2015-5174, CVE-2015-5345, CVE-2016-0706, and
                               CVE-2016-0714
                               23 March 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           F5 products
Publisher:         F5 Networks
Operating System:  Network Appliance
                   Virtualisation
Impact/Access:     Execute Arbitrary Code/Commands -- Existing Account
                   Access Confidential Data        -- Existing Account
Resolution:        None
CVE Names:         CVE-2016-0714 CVE-2016-0706 CVE-2015-5345
                   CVE-2015-5174  

Reference:         ESB-2016.0765
                   ESB-2016.0440

Original Bulletin: 
   https://support.f5.com/kb/en-us/solutions/public/k/30/sol30971148.html

Comment: F5 Networks advises exploitability of these vulnerabilities is 
         restricted to within the local network, due to the limited exposure
         of the Tomcat service.

- --------------------------BEGIN INCLUDED TEXT--------------------

SOL30971148: Apache Tomcat 6.x vulnerabilities CVE-2015-5174, CVE-2015-5345, 
CVE-2016-0706, and CVE-2016-0714

Security Advisory

Original Publication Date: 03/22/2016

Vulnerability Description

CVE-2015-5174

Directory traversal vulnerability in RequestUtil.java in Apache Tomcat 6.x 
before 6.0.45, 7.x before 7.0.65, and 8.x before 8.0.27 allows remote 
authenticated users to bypass intended SecurityManager restrictions and list a
parent directory via a /.. (slash dot dot) in a pathname used by a web 
application in a getResource, getResourceAsStream, or getResourcePaths call, 
as demonstrated by the $CATALINA_BASE/webapps directory.

CVE-2015-5345

The Mapper component in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.67, 
8.x before 8.0.30, and 9.x before 9.0.0.M2 processes redirects before 
considering security constraints and Filters, which allows remote attackers to
determine the existence of a directory via a URL that lacks a trailing / 
(slash) character.

CVE-2016-0706

Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x
before 9.0.0.M2 does not place 
org.apache.catalina.manager.StatusManagerServlet on the 
org/apache/catalina/core/RestrictedServlets.properties list, which allows 
remote authenticated users to bypass intended SecurityManager restrictions and
read arbitrary HTTP requests, and consequently discover session ID values, via
a crafted web application.

CVE-2016-0714

The session-persistence implementation in Apache Tomcat 6.x before 6.0.45, 7.x
before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 mishandles session 
attributes, which allows remote authenticated users to bypass intended 
SecurityManager restrictions and execute arbitrary code in a privileged 
context via a web application that places a crafted object in a session.

Impact

CVE-2015-5174

A remote authenticated user may bypass the security manager to obtain a 
directory listing for the directory where the web application was deployed.

BIG-IP/Enterprise Manager

The level of access required to create and deploy a malicious web application
implies a user with a significant trust level (for example: root). BIG-IP and
Enterprise Manager systems do not support customized web applications within 
the Tomcat configuration.

Traffix SDC

Exploitation of this vulnerability may occur if an attacker has access to the
local network of the system; the Tomcat service is accessible only from the 
internal network.

CVE-2015-5345

A remote attacker may be able to determine the existence of restricted 
directories by exploiting this vulnerability.

BIG-IP/Enterprise Manager

The Tomcat service is not directly exposed to the network, as it only listens
on a localhost socket with connections brokered through the Apache front-end 
web service.

Traffix SDC

Exploitation of this vulnerability may occur if an attacker has access to the
local network of the system; the Tomcat service is accessible only from the 
internal network.

CVE-2016-0706

When this vulnerability is exploited via crafted web application, a remote 
authenticated user may bypass the intended security manager restrictions, read
arbitrary HTTP requests, and discover session ID values.

BIG-IP/Enterprise Manager

BIG-IP and Enterprise Manager systems do not use the affected feature. The 
vulnerable software is present; however, the software is not used in a way 
that exposes this vulnerability.

Traffix SDC

Exploitation of this vulnerability may occur if an attacker has access to the
local network of the system; the Tomcat service is accessible only from the 
internal network.

CVE-2016-0714

A remote authenticated user may bypass the intended security manager 
restrictions and execute arbitrary code in a privileged context by exploiting
this vulnerability via a web application that places a crafted object in a 
session.

BIG-IP/Enterprise Manager

BIG-IP and Enterprise Manager systems do not use the affected feature. The 
vulnerable software is present; however, the software is not used in a way 
that exposes this vulnerability.

Traffix SDC

Exploitation of this vulnerability may occur if an attacker has access to the
local network of the system; the Tomcat service is accessible only from the 
internal network.

Security Issue Status

F5 Product Development has assigned IDs 576878, 576881, 576883, and 576884 
(BIG-IP), ID 578582 (Enterprise Manager), ID 466436 (ARX), and INSTALLER-2266
(Traffix SDC) to this vulnerability, and has evaluated the currently supported
releases for potential vulnerability.

To determine if your release is known to be vulnerable, the components or 
features that are affected by the vulnerability, and for information about 
releases or hotfixes that address the vulnerability, refer to the following 
table:

Product 			Versions known to be vulnerable 	Versions known to be not vulnerable 	Severity 	Vulnerable component or feature

BIG-IP LTM 			12.0.0					None 					Low 		Tomcat
				11.0.0 - 11.6.0
				10.1.0 - 10.2.4 

BIG-IP AAM 			12.0.0					None 					Low 		Tomcat
				11.4.0 - 11.6.0 

BIG-IP AFM 			12.0.0					None 					Low 		Tomcat
				11.3.0 - 11.6.0 

BIG-IP Analytics 		12.0.0					None 					Low 		Tomcat
				11.0.0 - 11.6.0 

BIG-IP APM 			12.0.0					None 					Low 		Tomcat
				11.0.0 - 11.6.0	
				10.1.0 - 10.2.4 

BIG-IP ASM 			12.0.0					None 					Low 		Tomcat
				11.0.0 - 11.6.0
				10.1.0 - 10.2.4 

BIG-IP DNS 			12.0.0 					None 					Low 		Tomcat

BIG-IP Edge Gateway 		11.0.0 - 11.3.0				None 					Low 		Tomcat
				10.1.0 - 10.2.4 

BIG-IP GTM 			11.0.0 - 11.6.0				None 					Low 		Tomcat
				10.1.0 - 10.2.4 

BIG-IP Link Controller 		12.0.0					None	 				Low 		Tomcat
				11.0.0 - 11.6.0
				10.1.0 - 10.2.4 

BIG-IP PEM 			12.0.0					None 					Low 		Tomcat
				11.3.0 - 11.6.0 

BIG-IP PSM 			11.0.0 - 11.4.1				None 					Low 		Tomcat
				10.1.0 - 10.2.4 

BIG-IP WebAccelerator 		11.0.0 - 11.3.0				None 					Low 		Tomcat
				10.1.0 - 10.2.4 

BIG-IP WOM 			11.0.0 - 11.3.0				None 					Low 		Tomcat
				10.1.0 - 10.2.4 

ARX 				6.0.0 - 6.4.0 				None 					Low 		GUI

Enterprise Manager 		3.0.0 - 3.1.1 				None 					Low 		Tomcat

FirePass 			None 					7.0.0					Not vulnerable 	None
									6.0.0 - 6.1.0 

BIG-IQ Cloud 			None 					4.0.0 - 4.5.0 				Not vulnerable 	None

BIG-IQ Device 			None 					4.2.0 - 4.5.0 				Not vulnerable 	None

BIG-IQ Security 		None 					4.0.0 - 4.5.0 				Not vulnerable 	None

BIG-IQ ADC			None 					4.5.0 					Not vulnerable 	None

BIG-IQ Centralized Management 	None 					4.6.0 					Not vulnerable 	None

BIG-IQ Cloud and Orchestration 	None 					1.0.0 					Not vulnerable 	None

LineRate 			None 					2.5.0 - 2.6.1 				Not vulnerable 	None

F5 WebSafe 			None 					1.0.0 					Not vulnerable 	None

Traffix SDC 			4.0.0 - 4.4.0				None 					Low 		Tomcat

				3.3.2 - 3.5.1 

Vulnerability Recommended Actions

If you are running a version listed in the Versions known to be vulnerable 
column, you can eliminate this vulnerability by upgrading to a version listed
in the Versions known to be not vulnerable column. If the table lists only an
older version than what you are currently running, or does not list a 
non-vulnerable version, then no upgrade candidate currently exists.

F5 responds to vulnerabilities in accordance with the Severity values 
published in the previous table. The Severity values and other security 
vulnerability parameters are defined in SOL4602: Overview of the F5 security 
vulnerability response policy.

Supplemental Information

SOL9970: Subscribing to email notifications regarding F5 products

SOL9957: Creating a custom RSS feed to view new and updated documents

SOL4918: Overview of the F5 critical issue hotfix policy

SOL167: Downloading software and firmware from F5

SOL13123: Managing BIG-IP product hotfixes (11.x - 12.x)

SOL10025: Managing BIG-IP product hotfixes (10.x)

SOL9502: BIG-IP hotfix matrix

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=eoX6
-----END PGP SIGNATURE-----