Korean
<< Back
VID 22792
Severity 30
Port 80, ...
Protocol TCP
Class WWW
Detailed Description According to its self-reported version number, the Apache Tomcat service running on the remote host is 7.0.x prior to 7.0.78. It is, therefore, affected by an implementation flaw in the error page reporting mechanism in which it does not conform to the Java Servlet Specification that requires static error pages to be processed as an HTTP GET request nothwithstanding the HTTP request method that was originally used when the error occurred. Depending on the original request and the configuration of the Default Servlet, an unauthenticated, remote attacker can exploit this issue to replace or remove custom error pages.

* References:
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_7.0.78
Recommendation There is no official fixed release available from the vendor at this time.

It is possible to mitigate this vulnerability by taking steps to ensure that SERVER_NAME is constructed from a static value. For example, on Apache systems, enable the UseCanonicalName setting within the Apache configuration. This will force PHP to use the configured ServerName directive value instead of relying on the HTTP Host request header, which can be manipulated by an attacker.
Related URL CVE-2017-5664 (CVE)
Related URL 98888 (SecurityFocus)
Related URL (ISS)