Process Automation- Apache Tomcat AJP File Inclusion Vulnerability
search cancel

Process Automation- Apache Tomcat AJP File Inclusion Vulnerability

book

Article ID: 218613

calendar_today

Updated On:

Products

CA Process Automation Base

Issue/Introduction

Vulnerability scan of Process Automation (ITPAM) servers reveal a 'Apache Tomcat AJP File Inclusion Vulnerability'.

Environment

CA Process Automation 4.x

Resolution

When Process Automation (ITPAM) is installed, all JBOSS files are installed.

ITPAM does not need the "jbossweb.sar" folder. 

To fix the reported vulnerability issue, please follow the below steps.

1.  Locate and backup the <ITPAM installation location>\PAM\server\c2o\deploy\jbossweb.sar\server.xml file

2.  Edit the file with a text editor to comment the "AJP 1.3 Connector" tag.

For example, comment the following section

<!--Connector port="${tomcat.connector.ajp.port}" address="${jboss.bind.address}" emptySessionPath="true" enableLookups="false" redirectPort="${tomcat.secure.port}" protocol="AJP/1.3" useBodyEncodingForURI="true" maxThreads="3000" backlog="20000" connectionTimeout="120000" keepAliveTimeout="120000"/-->

3.  Save changes and recycle the ITPAM service

Additional Information

In future releases of CA Process Automation (ITPAM), JBOSS will be upgraded to address these types of vulnerabilities.