VID |
22973 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
The fix for CVE-2020-9484 was incomplete. The version of Tomcat installed on the remote host is prior to 7.0.108. It is, therefore, affected by a remote code execution vulnerability via deserialization. An attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configured with sessionAttributeValueClassNameFilter=null (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and d) the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control. Note that both the previously published prerequisites for CVE-2020-9484 and the previously published mitigations for CVE-2020-9484 also apply to this issue.
* References: https://github.com/apache/tomcat/commit/74b105657ffbd1d1de80455f03446c3bbf30d1f5 https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.108
* Platforms Affected: Apache Tomcat Server versions 7.0.x prior to 7.0.108 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Apache Tomcat Server (7.0.108 or later), available from the Apache Software Foundation download site, http://tomcat.apache.org/ |
Related URL |
CVE-2021-25329 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|