漏洞信息详情
Apache Tomcat 路径遍历漏洞
漏洞简介
Apache Tomcat是美国阿帕奇(Apache)软件基金会的一款轻量级Web应用服务器。该程序实现了对Servlet和JavaServer Page(JSP)的支持。
Apache Tomcat的RequestUtil.java文件中存在目录遍历漏洞,该漏洞源于getResource、getResourceAsStream和getResourcePaths函数没有充分过滤路径名中的目录遍历字符‘..’。远程攻击者可利用该漏洞绕过既定的SecurityManager限制,列出父目录。以下版本受到影响:Apache Tomcat 6.0.45之前6.x版本,7.0.65之前7.x版本,8.0.27之前8.x版本。
漏洞公告
目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
参考网址
来源:BUGTRAQ
链接:http://seclists.org/bugtraq/2016/Feb/149
来源:CONFIRM
链接:http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
来源:UBUNTU
链接:http://www.ubuntu.com/usn/USN-3024-1
来源:CONFIRM
链接:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626
来源:REDHAT
链接:http://rhn.redhat.com/errata/RHSA-2016-2599.html
来源:CONFIRM
链接:http://tomcat.apache.org/security-8.html
来源:CONFIRM
链接:https://bto.bluecoat.com/security-advisory/sa118
来源:REDHAT
链接:http://rhn.redhat.com/errata/RHSA-2016-1435.html
来源:CONFIRM
链接:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442
来源:MLIST
链接:https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
来源:HP
链接:http://marc.info/?l=bugtraq&m=145974991225029&w=2
来源:DEBIAN
链接:http://www.debian.org/security/2016/dsa-3609
来源:REDHAT
链接:http://rhn.redhat.com/errata/RHSA-2016-2045.html
来源:CONFIRM
链接:http://svn.apache.org/viewvc?view=revision&revision=1700900
来源:MISC
链接:http://packetstormsecurity.com/files/135883/Apache-Tomcat-Limited-Directory-Traversal.html
来源:CONFIRM
链接:http://tomcat.apache.org/security-6.html
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00082.html
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2016:1434
来源:MLIST
链接:https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
来源:CONFIRM
链接:https://security.netapp.com/advisory/ntap-20180531-0001/
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2016:1433
来源:DEBIAN
链接:http://www.debian.org/security/2016/dsa-3530
来源:DEBIAN
链接:http://www.debian.org/security/2016/dsa-3552
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2016:1432
来源:SECTRACK
链接:http://www.securitytracker.com/id/1035070
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html
来源:CONFIRM
链接:http://svn.apache.org/viewvc?view=revision&revision=1696281
来源:GENTOO
链接:https://security.gentoo.org/glsa/201705-09
来源:CONFIRM
链接:http://svn.apache.org/viewvc?view=revision&revision=1696284
来源:CONFIRM
链接:http://tomcat.apache.org/security-7.html
来源:MLIST
链接:https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
来源:CONFIRM
链接:http://svn.apache.org/viewvc?view=revision&revision=1700898
来源:CONFIRM
链接:http://svn.apache.org/viewvc?view=revision&revision=1700897
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html
来源:CONFIRM
链接:http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
来源:CONFIRM
链接:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964
来源:MLIST
链接:https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
来源:BID
链接:http://www.securityfocus.com/bid/83329
受影响实体
- Canonical Ubuntu_linux:16.04:~~Lts~~~<!--2000-1-1-->
- Canonical Ubuntu_linux:15.10<!--2000-1-1-->
- Canonical Ubuntu_linux:14.04:~~Lts~~~<!--2000-1-1-->
- Canonical Ubuntu_linux:12.04:~~Lts~~~<!--2000-1-1-->
补丁
- Apache Tomcat 目录遍历漏洞的修复措施<!--2016-2-24-->
还没有评论,来说两句吧...