Korean
<< Back
VID 22805
Severity 30
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The version of Apache Tomcat installed on the remote host is 9.0.0.M1 or later but prior to 9.0.0.M22. It is, therefore, affected by multiple vulnerabilities :

- A flaw exists in the CORS filter because the HTTP Vary header was not properly added. This allows a remote attacker to conduct client-side and server-side cache poisoning attacks. (CVE-2017-7674)

- A flaw exists in the HTTP/2 implementation that bypasses a number of security checks that prevented directory traversal attacks. A remote attacker can exploit this to bypass security constraints. (CVE-2017-7675)

* References:
http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.0.M22

* Platforms Affected:
Apache Tomcat Server versions 9.x prior to 9.0.0.M22
Any operating system Any version
Recommendation Upgrade to the latest version of Apache Tomcat Server (9.0.0.M22 or later), available from the Apache Software Foundation download site, http://tomcat.apache.org/
Related URL CVE-2017-7674,CVE-2017-7675 (CVE)
Related URL 100256,100280 (SecurityFocus)
Related URL (ISS)