Hello,
I am using Tomcat Version: apache-tomcat-7.0.50
OS: Red Hat Enterprise Linux Server release 6.5 (Santiago) 64bit
Issue: There were 2 vulnerabilities found and need to know if there are
configurations or patches available to resolve these.
1. Tomcat was configured to use SSL https. It was found that there is an
input validation vulnerability that exists.
The error is due to improper filtering of HTTP requests, which could allow
users to conduct request attacks.
In server.xml these are enabled:
...
<Connector executor="tomcatThreadPool"
port="8080" protocol="HTTP/1.1"
connectionTimeout="20000"
redirectPort="8443" />
<Connector SSLEnabled="true"
keystoreType="PKCS12"
acceptCount="100"
clientAuth="false"
connectionTimeout="60000" disableUploadTimeout="false"
enableLookups="false"
SSLCertificateFile="/pathto/CERT.crt"
SSLCertificateKeyFile="pathto/KEY.key"
SSLPassword="........"
SSLCertificateChainFile="/pathto/Root.crt"
keyAlias="......."
maxHttpHeaderSize="8192"
maxThreads="150" minSpareThreads="5"
noCompressionUserAgents="gozilla, traviata" port="8443"
scheme="https" secure="true"
sslProtocol="TLSv1.2"/>
<Connector port="8009" protocol="AJP/1.3" redirectPort="8443" />
...
To prevent and restrict user redirection of https pages, the following solution
was also added and thought this may resolve this vulnerability:
In /webapps/WEB-INF/web.xml - does this web.xml update verify remediation on
this vulnerability issue? Or is there another solution that I should use?
WEB-INF/web.xml:
<security-constraint>
<web-resource-collection>
<web-resource-name>HTTPSOnly</web-resource-name>
<url-pattern>/*</url-pattern>
</web-resource-collection>
<user-data-constraint>
<transport-guarantee>CONFIDENTIAL</transport-guarantee>
</user-data-constraint>
</security-constraint>
<security-constraint>
<web-resource-collection>
<web-resource-name>HTTPSOrHTTP</web-resource-name>
<url-pattern>*.ico</url-pattern>
<url-pattern>/img/*</url-pattern>
<url-pattern>/css/*</url-pattern>
</web-resource-collection>
<user-data-constraint>
<transport-guarantee>NONE</transport-guarantee>
</user-data-constraint>
</security-constraint>
2. We are using Samba and NetBIOS Access through Tomcat to auto detect
Windows usernames internally, I am using the jcifs.jar in the Tomcat lib to do
this which to identifies the user's Windows username for a web application.
a. Is there a configuration we could use instead to remediate this
vulnerability reported in Tomcat 7?
b. Or would upgrading to Tomcat version 9 eliminate these 2
vulnerabilities ?
Example of what was found:
Vulnerability Title
Result
1. Apache Tomcat Input Validation Security Bypass Vulnerability
Apache Tomcat Input Validation Security Bypass Vulnerability detected on 8443
port.<title>Apache Tomcat/7.0.50 - Error report</title>Apache Tomcat Input
Validation Security Bypass Vulnerability detected on 8080 port.
2. Null Session/Password NetBIOS Access
Thanks for any information
________________________________
Larry Taylor