漏洞信息详情
Apache Tomcat 操作系统命令注入漏洞
漏洞简介
Apache Tomcat是美国阿帕奇(Apache)基金会的一款轻量级Web应用服务器。该程序实现了对Servlet和JavaServer Page(JSP)的支持。
Apache Tomcat 9.0.0.M1版本至9.0.17版本、8.5.0版本至8.5.39版本和7.0.0版本至7.0.93版本中的CGI Servlet存在操作系统命令注入漏洞。远程攻击者可利用该漏洞执行代码。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
http://mail-archives.apache.org/mod_mbox/www-announce/201904.mbox/%[email protected]%3E
参考网址
来源:MISC
链接:https://blog.trendmicro.com/trendlabs-security-intelligence/uncovering-cve-2019-0232-a-remote-code-execution-vulnerability-in-apache-tomcat/
来源:MISC
链接:https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
来源:lists.apache.org
链接:https://lists.apache.org/thread.html/dd4b325cdb261183dbf5ce913c102920a8f09c26dae666a98309165b@%3Cnotifications.ofbiz.apache.org%3E
来源:lists.apache.org
链接:https://lists.apache.org/thread.html/52ffb9fbf661245386a83a661183d13f1de2e5779fa23837a08e02ac@%3Ccommits.ofbiz.apache.org%3E
来源:lists.apache.org
链接:https://lists.apache.org/thread.html/673b6148d92cd7bc99ea2dcf85ad75d57da44fc322d51f37fb529a2a@%3Ccommits.ofbiz.apache.org%3E
来源:lists.apache.org
链接:https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
来源:lists.apache.org
链接:https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
来源:lists.apache.org
链接:https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
来源:github.com
链接:https://github.com/apache/tomcat/commit/4b244d8
来源:github.com
链接:https://github.com/apache/tomcat/commit/5bc4e6d
来源:github.com
链接:https://github.com/apache/tomcat/commit/7f0221b
来源:lists.apache.org
链接:https://lists.apache.org/thread.html/5f297a4b9080b5f65a05bc139596d0e437d6a539b25e31d29d028767@%3Cannounce.tomcat.apache.org%3E
来源:github.com
链接:https://github.com/pyn3rd/CVE-2019-0232
来源:tomcat.apache.org
链接:http://tomcat.apache.org/security-8.html
来源:tomcat.apache.org
链接:http://tomcat.apache.org/security-7.html
来源:mail-archives.us.apache.org
链接:http://mail-archives.us.apache.org/mod_mbox/www-announce/201904.mbox/%3C13d878ec-5d49-c348-48d4-25a6c81b9605%40apache.org%3E
来源:MISC
链接:https://codewhitesec.blogspot.com/2016/02/java-and-command-line-injections-in-windows.html
来源:N/A
链接:https://www.oracle.com/security-alerts/cpuapr2020.html
来源:MISC
链接:https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
来源:blogs.msdn.microsoft.com
链接:https://blogs.msdn.microsoft.com/twistylittlepassagesallalike/2011/04/23/everyone-quotes-command-line-arguments-the-wrong-way/
来源:web.archive.org
链接:https://web.archive.org/web/20161228144344/
来源:lists.apache.org
链接:https://lists.apache.org/thread.html/a6c87a09a71162fd563ab1c4e70a08a103e0b7c199fc391f1c9c4c35@%3Ccommits.ofbiz.apache.org%3E
来源:lists.apache.org
链接:https://lists.apache.org/thread.html/96849486813a95dfd542e1618b7923ca945508aaf4a4341f674d83e3@%3Cnotifications.ofbiz.apache.org%3E
来源:www.oracle.com
链接:https://www.oracle.com/security-alerts/cpujan2020.html
来源:MISC.
链接:https://tools.cisco.com/security/center/viewAlert.x?alertId=60004&vs_f=Alert%20RSS&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Apache%20Tomcat%20CGI%20Servlet%20Arbitrary%20Code%20Execution%20Vulnerability&vs_k=1
来源:MISC
链接:https://packetstormsecurity.com/files/153506/Apache-Tomcat-CGIServlet-enableCmdLineArguments-Remote-Code-Execution.html
来源:MLIST
链接:https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E
来源:MLIST
链接:https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
来源:MLIST
链接:https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
来源:BID
链接:http://www.securityfocus.com/bid/107906
来源:CONFIRM
链接:https://www.synology.com/security/advisory/Synology_SA_19_17
来源:MISC
链接:https://www.oracle.com/security-alerts/cpuApr2021.html
来源:CONFIRM
链接:https://security.netapp.com/advisory/ntap-20190419-0001/
来源:CONFIRM
链接:https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-784
来源:MLIST
链接:https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
来源:MLIST
链接:https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
来源:FULLDISC
链接:http://seclists.org/fulldisclosure/2019/May/4
来源:BID
链接:https://www.securityfocus.com/bid/107906
来源:MLIST
链接:https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2019:1712
来源:MISC
链接:https://wwws.nightwatchcybersecurity.com/2019/04/30/remote-code-execution-rce-in-cgi-servlet-apache-tomcat-on-windows-cve-2019-0232/
来源:MLIST
链接:https://lists.apache.org/thread.html/f4d48b32ef2b6aa49c8830241a9475da5b46e451f964b291c7a0a715@%3Cdev.tomcat.apache.org%3E
来源:tomcat.apache.org
链接:http://tomcat.apache.org/security-9.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/81154
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3250/
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-resilient-is-vulnerable-to-using-components-with-known-vulnerabilities/
来源:www.exploit-db.com
链接:https://www.exploit-db.com/exploits/47073
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Apache-Tomcat-code-execution-via-Windows-enableCmdLineArguments-28999
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/78854
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2019-0232
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/79910
来源:www.oracle.com
链接:https://www.oracle.com/security-alerts/cpujan2020verbose.html
来源:www.securityfocus.com
链接:https://www.securityfocus.com/bid/107906
来源:www-01.ibm.com
链接:https://www-01.ibm.com/support/docview.wss?uid=ibm10883578
受影响实体
暂无
补丁
- Apache Tomcat 安全漏洞的修复措施<!--2019-4-10-->
还没有评论,来说两句吧...