Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-17563

Опубликовано: 18 дек. 2019
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

When using FORM authentication with Apache Tomcat 9.0.0.M1 to 9.0.29, 8.5.0 to 8.5.49 and 7.0.0 to 7.0.98 there was a narrow window where an attacker could perform a session fixation attack. The window was considered too narrow for an exploit to be practical but, erring on the side of caution, this issue has been treated as a security vulnerability.

It was found that tomcat's FORM authentication allowed a very small period in which an attacker could possibly force a victim to use a valid user session, or Session Fixation. While practical exploit of this issue is deemed highly improbable, an abundance of caution merits it be considered a flaw. The highest threat from this vulnerability is to system availability, but also threatens data confidentiality and integrity.

Отчет

All affected Red Hat products providing the affected component code should update their setups per the product fixes given. The following Red Hat products are out of support scope for Low Impact flaws, and as such will not issue security fixes: Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 Red Hat JBoss BPM Suite 6 Red Hat JBoss BRMS 6

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat BPM Suite 6tomcatOut of support scope
Red Hat Enterprise Linux 5tomcat5Out of support scope
Red Hat Enterprise Linux 6tomcat6Out of support scope
Red Hat Enterprise Linux 8pki-deps:10.6/pki-servlet-engineFix deferred
Red Hat Fuse 7tomcatNot affected
Red Hat JBoss BRMS 6tomcatOut of support scope
Red Hat JBoss Data Grid 7tomcatNot affected
Red Hat JBoss Fuse 6tomcatNot affected
Red Hat Software Collectionsrh-java-common-tomcatNot affected
Red Hat Enterprise Linux 7tomcatFixedRHSA-2020:400429.09.2020

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-384
https://bugzilla.redhat.com/show_bug.cgi?id=1785711tomcat: Session fixation when using FORM authentication

EPSS

Процентиль: 87%
0.03258
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 5 лет назад

When using FORM authentication with Apache Tomcat 9.0.0.M1 to 9.0.29, 8.5.0 to 8.5.49 and 7.0.0 to 7.0.98 there was a narrow window where an attacker could perform a session fixation attack. The window was considered too narrow for an exploit to be practical but, erring on the side of caution, this issue has been treated as a security vulnerability.

CVSS3: 7.5
nvd
больше 5 лет назад

When using FORM authentication with Apache Tomcat 9.0.0.M1 to 9.0.29, 8.5.0 to 8.5.49 and 7.0.0 to 7.0.98 there was a narrow window where an attacker could perform a session fixation attack. The window was considered too narrow for an exploit to be practical but, erring on the side of caution, this issue has been treated as a security vulnerability.

CVSS3: 7.5
debian
больше 5 лет назад

When using FORM authentication with Apache Tomcat 9.0.0.M1 to 9.0.29, ...

CVSS3: 7.5
github
больше 5 лет назад

In Apache Tomcat, when using FORM authentication there was a narrow window where an attacker could perform a session fixation attack

CVSS3: 9.8
fstec
больше 5 лет назад

Уязвимость формы аутентификации сервера приложений Apache Tomcat, связанная с недостатком механизма фиксации сеанса, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании и оказать воздействие на целостность данных

EPSS

Процентиль: 87%
0.03258
Низкий

7.5 High

CVSS3