Tomcat vulnerabilities found on SavedInstall
search cancel

Tomcat vulnerabilities found on SavedInstall

book

Article ID: 205050

calendar_today

Updated On:

Products

CA Spectrum CA eHealth

Issue/Introduction

Have received new scan with the following entries for vulnerabilities.  

126245 Apache Tomcat 9.0.0.M1 < 9.0.20 DoS Medium 0 Plugin Output:
  Path              : /spectrum/Install-Tools/LOGS/10.4.1.0.215_20200710/SavedInstall.1719/webtomcat/bin/
  Installed version : 9.0.13
  Fixed version     : 9.0.20
The version of Tomcat installed on the remote host is prior to 9.0.20. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_9.0.20_security-9 advisory.

  - The fix for CVE-2019-0199 was incomplete and did not     address HTTP/2 connection window exhaustion on write. By     not sending WINDOW_UPDATE messages for the connection     window (stream 0) clients were able to cause server-side     threads to block eventually leading to thread exhaustion     and a DoS. (CVE-2019-10072)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Upgrade to Apache Tomcat version 9.0.20 or later.
126312 Apache Tomcat 9.0.0.M1 < 9.0.16 DoS Medium 0 Plugin Output:
  Path              : /spectrum/Install-Tools/LOGS/10.4.1.0.215_20200710/SavedInstall.1719/webtomcat/bin/
  Installed version : 9.0.13
  Fixed version     : 9.0.16
The version of Tomcat installed on the remote host is prior to 9.0.16.
It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_9.0.16_security-9 advisory.

  - The HTTP/2 implementation accepted streams with     excessive numbers of SETTINGS frames and also permitted     clients to keep streams open without reading/writing     request/response data. By keeping streams open for     requests that utilised the Servlet API's blocking I/O,     clients were able to cause server-side threads to block     eventually leading to thread exhaustion and a DoS.
    (CVE-2019-0199)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Upgrade to Apache Tomcat version 9.0.16 or later.
132419 Apache Tomcat 9.0.0.M1 < 9.0.30 Privilege Escalation Vulnerability Medium 0 Plugin Output:
  Path              : /spectrum/Install-Tools/LOGS/10.4.1.0.215_20200710/SavedInstall.1719/webtomcat/bin/
  Installed version : 9.0.13
  Fixed version     : 9.0.30
The version of Tomcat installed on the remote host is prior to 9.0.30. It is, therefore, affected by a privilege escalation vulnerability as referenced in the 'Fixed in Apache Tomcat 9.0.30' advisory.

  - When using FORM authentication there was a narrow window where an attacker could perform a session     fixation attack. The window was considered too narrow for an exploit to be practical but, erring on the     side of caution, this issue has been treated as a security vulnerability. (CVE-2019-17563)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Upgrade to Apache Tomcat version 9.0.30 or later.
133845 Apache Tomcat < 7.0.100 / 8.5.x < 8.5.51 / 9.x < 9.0.31 Multiple Vulnerabilities High 0 Plugin Output:
  Path              : /spectrum/Install-Tools/LOGS/10.4.1.0.215_20200710/SavedInstall.1719/webtomcat/bin/
  Installed version : 9.0.13
  Fixed version     : 9.0.31
The version of Tomcat installed on the remote host is prior to 7.0.100, 8.x prior to 8.5.51, or 9.x prior to 9.0.31. It is, therefore, affected by multiple vulnerabilities.

  - An HTTP request smuggling vulnerability exists in Tomcat due to mishandling Transfer-Encoding headers     behind a reverse proxy. An unauthenticated, remote attacker can exploit this, via crafted HTTP requests,     to cause unintended HTTP requests to reach the back-end. (CVE-2019-17569)

  - An HTTP request smuggling vulnerability exists in Tomcat due to bad end-of-line (EOL) parsing that allowed     some invalid HTTP headers to be parsed as valid. An unauthenticated, remote attacker can exploit this, via     crafted HTTP requests, to cause unintended HTTP requests to reach the back-end. (CVE-2020-1935)

  - An arbitrary file read vulnerability exists in Tomcat's Apache JServ Protocol (AJP) due to an     implementation defect. A remote, unauthenticated attacker could exploit this to access files which, under     normal conditions, would be restricted. If the Tomcat instance supports file uploads, the vulnerability     could also be leveraged to achieve remote code execution. (CVE-2020-1938)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Upgrade to Apache Tomcat version 7.0.100, 8.5.51, 9.0.31 or later.
136806 Apache Tomcat 9.0.0 < 9.0.35 Remote Code Execution Medium 0 Plugin Output:
  Path              : /spectrum/Install-Tools/LOGS/10.4.1.0.215_20200710/SavedInstall.1719/webtomcat/bin/
  Installed version : 9.0.13
  Fixed version     : 9.0.35
The version of Tomcat installed on the remote host is prior to 9.0.35. It is, therefore, affected by a remote code execution vulnerability as referenced in the fixed_in_apache_tomcat_9.0.35_security-9 advisory. Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. Upgrade to Apache Tomcat version 9.0.35 or later.
138098 Apache Tomcat 9.0.0.M1 < 9.0.36 DoS Medium 0 Plugin Output:
  Path              : /spectrum/Install-Tools/LOGS/10.4.1.0.215_20200710/SavedInstall.1719/webtomcat/bin/
  Installed version : 9.0.13
  Fixed version     : 9.0.36
The version of Tomcat installed on the remote host is prior to 9.0.36. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_9.0.36_security-9 advisory.

  - A specially crafted sequence of HTTP/2 requests could     trigger high CPU usage for several seconds. If a     sufficient number of such requests were made on     concurrent HTTP/2 connections, the server could become     unresponsive. (CVE-2020-11996)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Upgrade to Apache Tomcat version 9.0.36 or later.
138591 Apache Tomcat 9.0.0.M1 < 9.0.37 Multiple Vulnerabilities Medium 0 Plugin Output:
  Path              : /spectrum/Install-Tools/LOGS/10.4.1.0.215_20200710/SavedInstall.1719/webtomcat/bin/
  Installed version : 9.0.13
  Fixed version     : 9.0.37
The version of Tomcat installed on the remote host is prior to 9.0.37. It is, therefore, affected by multiple vulnerabilities as referenced in the fixed_in_apache_tomcat_9.0.37_security-9 advisory. Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. Upgrade to Apache Tomcat version 9.0.37 or later.
141446 Apache Tomcat 8.5.x < 8.5.58 / 9.0.x < 9.0.38 HTTP/2 Request Mix-Up Medium 0 Plugin Output:
  Path              : /spectrum/Install-Tools/LOGS/10.4.1.0.215_20200710/SavedInstall.1719/webtomcat/bin/
  Installed version : 9.0.13
  Fixed version     : 9.0.38
The version of Tomcat installed on the remote host is 8.5.x prior to 8.5.58 or 9.0.x prior to 9.0.38. It is, therefore, affected by a vulnerability. If an HTTP/2 client exceeds the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it is possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This can lead to users seeing responses for unexpected resources.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Upgrade to Apache Tomcat version 8.5.58, 9.0.38 or later.

 

Environment

Release : 10.4.1

Component : Spectrum Core / SpectroSERVER

Resolution

These are older/backed up install areas during some upgrades.

These directories can simply be deleted.