CVE编号
CVE-2014-0033利用情况
暂无补丁情况
官方补丁披露时间
2014-02-27漏洞描述
Apache Tomcat是一款开放源码的JSP应用服务器程序。由于对路径参数处理的修复引入的回溯,即使在启用disableURLRewriting的情况下也可导致一个会话固定攻击,允许远程攻击者利用漏洞未授权访问应用。
解决建议
Apache Tomcat 6.0.39已经修复该漏洞,建议用户下载更新:http://tomcat.apache.org/
参考链接 |
|
---|---|
http://seclists.org/fulldisclosure/2014/Dec/23 | |
http://secunia.com/advisories/59036 | |
http://secunia.com/advisories/59722 | |
http://secunia.com/advisories/59873 | |
http://svn.apache.org/viewvc?view=revision&revision=1558822 | |
http://tomcat.apache.org/security-6.html | |
http://www-01.ibm.com/support/docview.wss?uid=swg21675886 | |
http://www-01.ibm.com/support/docview.wss?uid=swg21677147 | |
http://www-01.ibm.com/support/docview.wss?uid=swg21678231 | |
http://www.debian.org/security/2016/dsa-3530 | |
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html | |
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html | |
http://www.securityfocus.com/archive/1/534161/100/0/threaded | |
http://www.securityfocus.com/bid/65769 | |
http://www.ubuntu.com/usn/USN-2130-1 | |
http://www.vmware.com/security/advisories/VMSA-2014-0012.html | |
https://bugzilla.redhat.com/show_bug.cgi?id=1069919 | |
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930f... | |
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04cc... | |
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930... | |
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236... | |
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9... | |
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6... |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | apache | tomcat | 6.0.33 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | tomcat | 6.0.34 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | tomcat | 6.0.35 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | tomcat | 6.0.36 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | tomcat | 6.0.37 | - | |||||
运行在以下环境 | |||||||||
系统 | debian | DPKG | * |
Up to (excluding) 6.0.39 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_12.04_lts | tomcat6 | * |
Up to (excluding) 6.0.35-1ubuntu3.4 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_14.04_lts | tomcat6 | * |
Up to (excluding) 6.0.39-1 |
- 攻击路径 远程
- 攻击复杂度 复杂
- 权限要求 无需权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 数据泄露
- 数据完整性 传输被破坏
- 服务器危害 无影响
- 全网数量 N/A
还没有评论,来说两句吧...