Apache Tomcat Security Manager up to 6.0.39/7.0.53/8.0.5 XSLT access control

| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 4.7 | $0-$5k | 0.00 |
Summary
A vulnerability, which was classified as problematic, was found in Apache Tomcat Security Manager up to 6.0.39/7.0.53/8.0.5. Affected is an unknown function of the component XSLT Handler. The manipulation results in access control. This vulnerability is identified as CVE-2014-0096. There is not any exploit available. You should upgrade the affected component.
Details
A vulnerability, which was classified as problematic, was found in Apache Tomcat Security Manager up to 6.0.39/7.0.53/8.0.5 (Application Server Software). Affected is some unknown functionality of the component XSLT Handler. The manipulation with an unknown input leads to a access control vulnerability. CWE is classifying the issue as CWE-264. This is going to have an impact on confidentiality, and integrity. CVE summarizes:
java/org/apache/catalina/servlets/DefaultServlet.java in the default servlet in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 does not properly restrict XSLT stylesheets, which allows remote attackers to bypass security-manager restrictions and read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
The bug was discovered 02/27/2014. The weakness was released 03/27/2014 with Tomcat Security Team as Fixed in Apache Tomcat 8.0.5 as confirmed release notes (Website). The advisory is available at tomcat.apache.org. This vulnerability is traded as CVE-2014-0096 since 12/03/2013. It is possible to launch the attack remotely. A authentication is required for exploitation. The technical details are unknown and an exploit is not available. This vulnerability is assigned to T1068 by the MITRE ATT&CK project. The advisory points out:
The default servlet allows web applications to define (at multiple levels) an XSLT to be used to format a directory listing. When running under a security manager, the processing of these was not subject to the same constraints as the web application. This enabled a malicious web application to bypass the file access constraints imposed by the security manager via the use of external XML entities.
The vulnerability was handled as a non-public zero-day exploit for at least 28 days. During that time the estimated underground price was around $5k-$25k. The vulnerability scanner Nessus provides a plugin with the ID 79670 (F5 Networks BIG-IP : Apache Tomcat vulnerability (SOL15428)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family F5 Networks Local Security Checks. The commercial vulnerability scanner Qualys is able to test this issue with plugin 185089 (HP-UX Apache Server Suite Multiple Vulnerabilities (HPSBUX03102)).
Upgrading to version 6.0.41, 7.0.54 or 8.0.8 eliminates this vulnerability. A possible mitigation has been published immediately after the disclosure of the vulnerability. The release notes contains the following remark:
This was fixed in revisions 1578610 and 1578611.
The vulnerability is also documented in the databases at X-Force (93367), Tenable (79670), SecurityFocus (BID 67667†), OSVDB (107475†) and Secunia (SA57879†). Entries connected to this vulnerability are available at VDB-13383, VDB-13384, VDB-13385 and VDB-13387. VulDB is the best source for vulnerability data and more expert information about this specific topic.
Product
Type
Vendor
Name
Version
- 6.0.0
- 6.0.1
- 6.0.2
- 6.0.3
- 6.0.4
- 6.0.5
- 6.0.6
- 6.0.7
- 6.0.8
- 6.0.9
- 6.0.10
- 6.0.11
- 6.0.12
- 6.0.13
- 6.0.14
- 6.0.15
- 6.0.16
- 6.0.17
- 6.0.18
- 6.0.19
- 6.0.20
- 6.0.21
- 6.0.22
- 6.0.23
- 6.0.24
- 6.0.25
- 6.0.26
- 6.0.27
- 6.0.28
- 6.0.29
- 6.0.30
- 6.0.31
- 6.0.32
- 6.0.33
- 6.0.34
- 6.0.35
- 6.0.36
- 6.0.37
- 6.0.38
- 6.0.39
- 7.0.0
- 7.0.1
- 7.0.2
- 7.0.3
- 7.0.4
- 7.0.5
- 7.0.6
- 7.0.7
- 7.0.8
- 7.0.9
- 7.0.10
- 7.0.11
- 7.0.12
- 7.0.13
- 7.0.14
- 7.0.15
- 7.0.16
- 7.0.17
- 7.0.18
- 7.0.19
- 7.0.20
- 7.0.21
- 7.0.22
- 7.0.23
- 7.0.24
- 7.0.25
- 7.0.26
- 7.0.27
- 7.0.28
- 7.0.29
- 7.0.30
- 7.0.31
- 7.0.32
- 7.0.33
- 7.0.34
- 7.0.35
- 7.0.36
- 7.0.37
- 7.0.38
- 7.0.39
- 7.0.40
- 7.0.41
- 7.0.42
- 7.0.43
- 7.0.44
- 7.0.45
- 7.0.46
- 7.0.47
- 7.0.48
- 7.0.49
- 7.0.50
- 7.0.51
- 7.0.52
- 7.0.53
- 8.0.0
- 8.0.1
- 8.0.2
- 8.0.3
- 8.0.4
- 8.0.5
License
Website
- Vendor: https://www.apache.org/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.4VulDB Meta Temp Score: 4.7
VulDB Base Score: 5.4
VulDB Temp Score: 4.7
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Access controlCWE: CWE-264
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Unproven
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 79670
Nessus Name: F5 Networks BIG-IP : Apache Tomcat vulnerability (SOL15428)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Port: 🔍
OpenVAS ID: 703530
OpenVAS Name: Debian Security Advisory DSA 3530-1 (tomcat6 - security update)
OpenVAS File: 🔍
OpenVAS Family: 🔍
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Upgrade: Tomcat Security Manager 6.0.41/7.0.54/8.0.8
Timeline
12/03/2013 🔍02/27/2014 🔍
03/27/2014 🔍
03/27/2014 🔍
05/27/2014 🔍
05/27/2014 🔍
05/27/2014 🔍
05/28/2014 🔍
05/28/2014 🔍
05/29/2014 🔍
05/31/2014 🔍
12/03/2014 🔍
06/20/2021 🔍
Sources
Vendor: apache.orgAdvisory: Fixed in Apache Tomcat 8.0.5
Organization: Tomcat Security Team
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2014-0096 (🔍)
GCVE (CVE): GCVE-0-2014-0096
GCVE (VulDB): GCVE-100-13386
OVAL: 🔍
IAVM: 🔍
X-Force: 93367 - Apache Tomcat XXE information disclosure, Medium Risk
SecurityFocus: 67667 - Apache Tomcat CVE-2014-0096 XML External Entity Information Disclosure Vulnerability
Secunia: 57879 - Apache Tomcat Information Disclosure and Security Bypass Vulnerabilities, Moderately Critical
OSVDB: 107475
SecurityTracker: 1030301 - Apache Tomcat Security Manager Bug Lets Remote Authenticated Users Bypass Security Controls and View Files
Vulnerability Center: 44682 - Apache Tomcat 6.0.0-6.0.39, 7.0.0-7.0.52 and 8.0.0-RC1 to 8.0.3 and Multiple F5 Products Remote Information Disclosure Vulnerability via XML Files, Medium
See also: 🔍
Entry
Created: 05/28/2014 11:28Updated: 06/20/2021 12:43
Changes: 05/28/2014 11:28 (96), 05/29/2017 08:58 (4), 06/20/2021 12:43 (3)
Complete: 🔍
Cache ID: 216:BFB:103
No comments yet. Languages: en.
Please log in to comment.