Bug#503309: tomcat6: Several security issues in Tomcat

Dominic Hargreaves dom at earth.li
Sat Nov 8 19:09:14 UTC 2008


On Fri, Oct 24, 2008 at 05:41:39PM +0200, Moritz Muehlenhoff wrote:
> Several vulnerabilities have been fixed in Apache Tomcat 6.0.18, see
> below.
> 
> BTW, do we really need two Tomcat versions in Lenny? Is Tomcat 6
> incompatible with 5.5?

It doesn't look like the tomcat6 source package actually supplies the
main tomcat6 server as binary packages (see
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=413906 for details).

I believe that this means that theses issues are not present in Debian,
and that the severity of this bug should therefore be lowered. Java
maintainers, do you agree, and if so could you lower this from RC
severity?

Thanks,
Dominic.

>     low: Cross-site scripting CVE-2008-1232
> 
>     The message argument of HttpServletResponse.sendError() call is not only displayed on the error page, but is also used for
> +the reason-phrase of HTTP response. This may include characters that are illegal in HTTP headers. It is possible for a
> +specially crafted message to result in arbitrary content being injected into the HTTP response. For a successful XSS attack,
> +unfiltered user supplied data must be included in the message argument.
> 
>     This was fixed in revision 673834.
> 
>     Affects: 6.0.0-6.0.16
> 
> 
>     low: Cross-site scripting CVE-2008-1947
> 
>     The Host Manager web application did not escape user provided data before including it in the output. This enabled a XSS
> +attack. This application now filters the data before use. This issue may be mitigated by logging out (closing the browser) of
> +the application once the management tasks have been completed.
> 
>     This was fixed in revision 662585.
> 
>     Affects: 6.0.0-6.0.16
> 
> 
>     important: Information disclosure CVE-2008-2370
> 
>     When using a RequestDispatcher the target path was normalised before the query string was removed. A request that included a+specially crafted request parameter could be used to access content that would otherwise be protected by a security constraint
> +or by locating it in under the WEB-INF directory.
> 
>     This was fixed in revision 673839.
> 
>     Affects: 6.0.0-6.0.16
> 
> 
>     important: Directory traversal CVE-2008-2938
> 
>     If a context is configured with allowLinking="true" and the connector is configured with URIEncoding="UTF-8" then a
> +malformed request may be used to access arbitrary files on the server. If the connector is configured with URIEncoding="UTF-8"
> +then a malformed request may be used to access arbitrary files within the docBase of a context such as web.xml. It should also
> +be noted that setting useBodyEncodingForURI="true" has the same effect as setting URIEncoding="UTF-8" when processing requests
> +with bodies encoded with UTF-8.
> 
>     This was fixed in revision 678137.
> 
>     Affects: 6.0.0-6.0.16

-- 
Dominic Hargreaves | http://www.larted.org.uk/~dom/
PGP key 5178E2A5 from the.earth.li (keyserver,web,email)





More information about the pkg-java-maintainers mailing list