ghsa-w65j-cmqc-37p2
Vulnerability from github
Published
2022-05-01 18:32
Modified
2023-09-22 21:54
Summary
JULI logging component in Apache Tomcat does not restrict certain permissions for web applications
Details
The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler
handler.
{ "affected": [ { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat:tomcat-juli" }, "ranges": [ { "events": [ { "introduced": "5.5.9" }, { "last_affected": "5.5.25" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat:tomcat-juli" }, "ranges": [ { "events": [ { "introduced": "6.0.0" }, { "last_affected": "6.0.15" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2007-5342" ], "database_specific": { "cwe_ids": [ "CWE-284" ], "github_reviewed": true, "github_reviewed_at": "2023-09-22T21:54:06Z", "nvd_published_at": "2007-12-27T22:46:00Z", "severity": "MODERATE" }, "details": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the `org.apache.juli.FileHandler` handler.", "id": "GHSA-w65j-cmqc-37p2", "modified": "2023-09-22T21:54:06Z", "published": "2022-05-01T18:32:22Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39201" }, { "type": "PACKAGE", "url": "https://github.com/apache/tomcat/tree/main/java/org/apache/juli" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf@%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5@%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10417" }, { "type": "WEB", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00315.html" }, { "type": "WEB", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00460.html" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=139344343412337\u0026w=2" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-200804-10.xml" }, { "type": "WEB", "url": "http://securityreason.com/securityalert/3485" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT3216" }, { "type": "WEB", "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm" }, { "type": "WEB", "url": "http://svn.apache.org/viewvc?view=rev\u0026revision=606594" }, { "type": "WEB", "url": "http://tomcat.apache.org/security-5.html" }, { "type": "WEB", "url": "http://tomcat.apache.org/security-6.html" }, { "type": "WEB", "url": "http://www.debian.org/security/2008/dsa-1447" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:188" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2008-0042.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2008-0195.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2008-0831.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2008-0832.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2008-0833.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2008-0834.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2008-0862.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/485481/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/27006" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/31681" }, { "type": "WEB", "url": "http://www.vmware.com/security/advisories/VMSA-2008-0010.html" }, { "type": "WEB", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" } ], "schema_version": "1.4.0", "severity": [], "summary": "JULI logging component in Apache Tomcat does not restrict certain permissions for web applications" }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.