wid-sec-w-2023-1229
Vulnerability from csaf_certbund
Published
2019-12-18 23:00
Modified
2023-09-27 22:00
Summary
Apache Tomcat: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Apache Tomcat ist ein Web-Applikationsserver für verschiedene Plattformen.
Angriff
Ein lokaler Angreifer kann mehrere Schwachstellen in Apache Tomcat ausnutzen, um Daten offenzulegen oder die Kontrolle über eine Tomcat-Instanz zu erlangen.
Betroffene Betriebssysteme
- UNIX
- Linux
- Windows
- F5 Networks
- Appliance
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Apache Tomcat ist ein Web-Applikationsserver für verschiedene Plattformen.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein lokaler Angreifer kann mehrere Schwachstellen in Apache Tomcat ausnutzen, um Daten offenzulegen oder die Kontrolle über eine Tomcat-Instanz zu erlangen.", title: "Angriff", }, { category: "general", text: "- UNIX\n- Linux\n- Windows\n- F5 Networks\n- Appliance", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-1229 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2019/wid-sec-w-2023-1229.json", }, { category: "self", summary: "WID-SEC-2023-1229 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1229", }, { category: "external", summary: "Amazon Linux Security Advisory ALASTOMCAT8.5-2023-013 vom 2023-09-27", url: "https://alas.aws.amazon.com/AL2/ALASTOMCAT8.5-2023-013.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALASTOMCAT9-2023-008 vom 2023-09-27", url: "https://alas.aws.amazon.com/AL2/ALASTOMCAT9-2023-008.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2023-2047 vom 2023-05-17", url: "https://alas.aws.amazon.com/AL2/ALAS-2023-2047.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0226-1 vom 2020-01-25", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200226-1.html", }, { category: "external", summary: "Ubuntu Security Notice USN-4251-1 vom 2020-01-27", url: "https://usn.ubuntu.com/4251-1/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0029-1 vom 2020-01-08", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200029-1.html", }, { category: "external", summary: "F5 Security Advisory K24551552 vom 2020-01-23", url: "https://support.f5.com/csp/article/K24551552", }, { category: "external", summary: "Apache Tomcat Security Advisory vom 2019-12-18", url: "http://tomcat.apache.org/security-9.html", }, { category: "external", summary: "Apache Tomcat Security Advisory vom 2019-12-18", url: "http://tomcat.apache.org/security-8.html", }, { category: "external", summary: "Apache Tomcat Security Advisory vom 2019-12-18", url: "http://tomcat.apache.org/security-7.html", }, { category: "external", summary: "Debian Security Advisory DSA-4596 vom 2019-12-28", url: "https://www.debian.org/security/2019/dsa-4596", }, { category: "external", summary: "AVAYA Security Advisory ASA-2020-005 vom 2020-02-23", url: "https://downloads.avaya.com/css/P8/documents/101064338", }, { category: "external", summary: "AVAYA Security Advisory ASA-2020-011 vom 2020-02-26", url: "https://downloads.avaya.com/css/P8/documents/101064359", }, { category: "external", summary: "Debian Security Advisory DLA 2077 vom 2020-03-02", url: "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202001/msg00024.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0632-1 vom 2020-03-10", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200632-1.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:0861 vom 2020-03-17", url: "https://access.redhat.com/errata/RHSA-2020:0861", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:0860 vom 2020-03-17", url: "https://access.redhat.com/errata/RHSA-2020:0860", }, { category: "external", summary: "Debian Security Advisory DLA 2155 vom 2020-04-01", url: "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202003/msg00029.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:1521 vom 2020-04-21", url: "https://access.redhat.com/errata/RHSA-2020:1521", }, { category: "external", summary: "Debian Security Advisory DSA-4680 vom 2020-05-07", url: "https://security-tracker.debian.org/tracker/DSA-4680-1", }, { category: "external", summary: "Debian Security Advisory DLA 2209 vom 2020-05-29", url: "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202005/msg00026.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:1498-1 vom 2020-06-16", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20201498-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:1497-1 vom 2020-06-16", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20201497-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:14375-1 vom 2020-06-16", url: "https://www.suse.com/support/update/announcement/2020/suse-su-202014375-1.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:1030 vom 2021-03-30", url: "https://access.redhat.com/errata/RHSA-2021:1030", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:4004 vom 2020-09-29", url: "https://access.redhat.com/errata/RHSA-2020:4004", }, { category: "external", summary: "AVAYA Security Advisory ASA-2020-118 vom 2020-10-15", url: "https://downloads.avaya.com/css/P8/documents/101071434", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:0882 vom 2021-03-16", url: "https://access.redhat.com/errata/RHSA-2021:0882", }, ], source_lang: "en-US", title: "Apache Tomcat: Mehrere Schwachstellen", tracking: { current_release_date: "2023-09-27T22:00:00.000+00:00", generator: { date: "2024-08-15T17:50:57.905+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-1229", initial_release_date: "2019-12-18T23:00:00.000+00:00", revision_history: [ { date: "2019-12-18T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2019-12-29T23:00:00.000+00:00", number: "2", summary: "Neue Updates von Debian aufgenommen", }, { date: "2020-01-07T23:00:00.000+00:00", number: "3", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-01-23T23:00:00.000+00:00", number: "4", summary: "Neue Updates von F5 aufgenommen", }, { date: "2020-01-26T23:00:00.000+00:00", number: "5", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-01-27T23:00:00.000+00:00", number: "6", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-02-23T23:00:00.000+00:00", number: "7", summary: "Neue Updates von AVAYA aufgenommen", }, { date: "2020-02-24T23:00:00.000+00:00", number: "8", summary: "Betroffene Produkte von Avaya ergänzt", }, { date: "2020-02-25T23:00:00.000+00:00", number: "9", summary: "Neue Updates von AVAYA aufgenommen", }, { date: "2020-03-02T23:00:00.000+00:00", number: "10", summary: "Neue Updates von Debian aufgenommen", }, { date: "2020-03-10T23:00:00.000+00:00", number: "11", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-03-17T23:00:00.000+00:00", number: "12", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-04-01T22:00:00.000+00:00", number: "13", summary: "Neue Updates von Debian aufgenommen", }, { date: "2020-04-20T22:00:00.000+00:00", number: "14", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-05-06T22:00:00.000+00:00", number: "15", summary: "Neue Updates von Debian aufgenommen", }, { date: "2020-05-28T22:00:00.000+00:00", number: "16", summary: "Neue Updates von Debian aufgenommen", }, { date: "2020-06-16T22:00:00.000+00:00", number: "17", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-09-29T22:00:00.000+00:00", number: "18", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-10-14T22:00:00.000+00:00", number: "19", summary: "Neue Updates von AVAYA aufgenommen", }, { date: "2021-03-16T23:00:00.000+00:00", number: "20", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2021-03-29T22:00:00.000+00:00", number: "21", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2023-05-16T22:00:00.000+00:00", number: "22", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2023-09-27T22:00:00.000+00:00", number: "23", summary: "Neue Updates von Amazon aufgenommen", }, ], status: "final", version: "23", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Amazon Linux 2", product: { name: "Amazon Linux 2", product_id: "398363", product_identification_helper: { cpe: "cpe:/o:amazon:linux_2:-", }, }, }, ], category: "vendor", name: "Amazon", }, { branches: [ { branches: [ { category: "product_name", name: "Apache Tomcat < 7.0.99", product: { name: "Apache Tomcat < 7.0.99", product_id: "T015581", product_identification_helper: { cpe: "cpe:/a:apache:tomcat:7.0.99", }, }, }, { category: "product_name", name: "Apache Tomcat < 8.5.50", product: { name: "Apache Tomcat < 8.5.50", product_id: "T015582", product_identification_helper: { cpe: "cpe:/a:apache:tomcat:8.5.50", }, }, }, { category: "product_name", name: "Apache Tomcat < 9.0.30", product: { name: "Apache Tomcat < 9.0.30", product_id: "T015583", product_identification_helper: { cpe: "cpe:/a:apache:tomcat:9.0.30", }, }, }, ], category: "product_name", name: "Tomcat", }, ], category: "vendor", name: "Apache", }, { branches: [ { category: "product_name", name: "Avaya Aura Application Enablement Services", product: { name: "Avaya Aura Application Enablement Services", product_id: "T015516", product_identification_helper: { cpe: "cpe:/a:avaya:aura_application_enablement_services:-", }, }, }, { category: "product_name", name: "Avaya Aura Communication Manager", product: { name: "Avaya Aura Communication Manager", product_id: "T015126", product_identification_helper: { cpe: "cpe:/a:avaya:communication_manager:-", }, }, }, { category: "product_name", name: "Avaya Aura Experience Portal", product: { name: "Avaya Aura Experience Portal", product_id: "T015519", product_identification_helper: { cpe: "cpe:/a:avaya:aura_experience_portal:-", }, }, }, { category: "product_name", name: "Avaya Aura Session Manager", product: { name: "Avaya Aura Session Manager", product_id: "T015127", product_identification_helper: { cpe: "cpe:/a:avaya:session_manager:-", }, }, }, { category: "product_name", name: "Avaya Aura System Manager", product: { name: "Avaya Aura System Manager", product_id: "T015518", product_identification_helper: { cpe: "cpe:/a:avaya:aura_system_manager:-", }, }, }, { category: "product_name", name: "Avaya Aura Utility Services", product: { name: "Avaya Aura Utility Services", product_id: "T015824", product_identification_helper: { cpe: "cpe:/a:avaya:aura_utility_services:-", }, }, }, { category: "product_name", name: "Avaya CMS", product: { name: "Avaya CMS", product_id: "997", product_identification_helper: { cpe: "cpe:/a:avaya:call_management_system_server:-", }, }, }, { category: "product_name", name: "Avaya Session Border Controller", product: { name: "Avaya Session Border Controller", product_id: "T015520", product_identification_helper: { cpe: "cpe:/h:avaya:session_border_controller:-", }, }, }, { category: "product_name", name: "Avaya Web License Manager", product: { name: "Avaya Web License Manager", product_id: "T016243", product_identification_helper: { cpe: "cpe:/a:avaya:web_license_manager:-", }, }, }, { category: "product_name", name: "Avaya one-X", product: { name: "Avaya one-X", product_id: "1024", product_identification_helper: { cpe: "cpe:/a:avaya:one-x:-", }, }, }, ], category: "vendor", name: "Avaya", }, { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { category: "product_name", name: "F5 BIG-IP", product: { name: "F5 BIG-IP", product_id: "T001663", product_identification_helper: { cpe: "cpe:/a:f5:big-ip:-", }, }, }, ], category: "vendor", name: "F5", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2019-12418", notes: [ { category: "description", text: "Es existiert eine Schwachstelle in Apache Tomcat wenn er mit dem JMX Remote Lifecycle Listener konfiguriert wird. Ein lokaler Angreifer ohne Zugriff auf den Tomcat-Prozess oder die Konfigurationsdateien kann die RMI-Registry manipulieren, um einen Man-in-the-Middle-Angriff durchzuführen, um Benutzernamen und Passwörter für den Zugriff auf die JMX-Schnittstelle zu erfassen. Der Angreifer kann dann mit diesen Anmeldeinformationen auf die JMX-Schnittstelle zugreifen und die volle Kontrolle über die Tomcat-Instanz erlangen.", }, ], product_status: { known_affected: [ "T015519", "2951", "T002207", "67646", "T015516", "T015824", "1024", "T000126", "997", "T001663", "398363", "T015520", ], }, release_date: "2019-12-18T23:00:00.000+00:00", title: "CVE-2019-12418", }, { cve: "CVE-2019-17563", notes: [ { category: "description", text: "Es existiert eine Schwachstelle in Apache Tomcat. Bei der Verwendung von FORM-Authentifizierung gibt es ein enges Fenster, in dem ein Angreifer einen Session-Fixierungsangriff durchführen könnte. Da dieses Fester für eine Ausnutzung jedoch als zu eng angesehen wird, gilt ein Exploit als unwahrscheinlich.", }, ], product_status: { known_affected: [ "T015519", "T015518", "67646", "T015516", "T015824", "T015127", "T015126", "T015520", "T016243", "2951", "T002207", "1024", "T000126", "997", "T001663", "398363", ], }, release_date: "2019-12-18T23:00:00.000+00:00", title: "CVE-2019-17563", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.