ALAS-2019-1208

Related Vulnerabilities: CVE-2018-11784   CVE-2019-0199   CVE-2019-0232  

When the default servlet in Apache Tomcat returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice. (CVE-2018-11784) When running on Windows with enableCmdLineArguments enabled, the CGI Servlet in Apache Tomcat is vulnerable to Remote Code Execution due to a bug in the way the JRE passes command line arguments to Windows. The CGI Servlet is disabled by default. The CGI option enableCmdLineArguments is disable by default in Tomcat 9.0.x (and will be disabled by default in all versions in response to this vulnerability). For a detailed explanation of the JRE behaviour, see Markus Wulftange's blog (https://codewhitesec.blogspot.com/2016/02/java-and-command-line-injections-in-windows.html) and this archived MSDN blog (https://web.archive.org/web/20161228144344/https://blogs.msdn.microsoft.com/twistylittlepassagesallalike/2011/04/23/everyone-quotes-command-line-arguments-the-wrong-way/). (CVE-2019-0232) The HTTP/2 implementation in Apache Tomcat accepted streams with excessive numbers of SETTINGS frames and also permitted clients to keep streams open without reading/writing request/response data. By keeping streams open for requests that utilised the Servlet API's blocking I/O, clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS. (CVE-2019-0199)

ALAS-2019-1208


Amazon Linux AMI Security Advisory: ALAS-2019-1208
Advisory Release Date: 2019-05-16 23:11 Pacific
Advisory Updated Date: 2019-05-20 18:59 Pacific
Severity: Important

Issue Overview:

When the default servlet in Apache Tomcat returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice. (CVE-2018-11784)

When running on Windows with enableCmdLineArguments enabled, the CGI Servlet in Apache Tomcat is vulnerable to Remote Code Execution due to a bug in the way the JRE passes command line arguments to Windows. The CGI Servlet is disabled by default. The CGI option enableCmdLineArguments is disable by default in Tomcat 9.0.x (and will be disabled by default in all versions in response to this vulnerability). For a detailed explanation of the JRE behaviour, see Markus Wulftange's blog (https://codewhitesec.blogspot.com/2016/02/java-and-command-line-injections-in-windows.html) and this archived MSDN blog (https://web.archive.org/web/20161228144344/https://blogs.msdn.microsoft.com/twistylittlepassagesallalike/2011/04/23/everyone-quotes-command-line-arguments-the-wrong-way/). (CVE-2019-0232)

The HTTP/2 implementation in Apache Tomcat accepted streams with excessive numbers of SETTINGS frames and also permitted clients to keep streams open without reading/writing request/response data. By keeping streams open for requests that utilised the Servlet API's blocking I/O, clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS. (CVE-2019-0199)


Affected Packages:

tomcat8


Issue Correction:
Run yum update tomcat8 to update your system.

New Packages:
noarch:
    tomcat8-8.5.40-1.79.amzn1.noarch
    tomcat8-docs-webapp-8.5.40-1.79.amzn1.noarch
    tomcat8-el-3.0-api-8.5.40-1.79.amzn1.noarch
    tomcat8-admin-webapps-8.5.40-1.79.amzn1.noarch
    tomcat8-jsp-2.3-api-8.5.40-1.79.amzn1.noarch
    tomcat8-log4j-8.5.40-1.79.amzn1.noarch
    tomcat8-servlet-3.1-api-8.5.40-1.79.amzn1.noarch
    tomcat8-webapps-8.5.40-1.79.amzn1.noarch
    tomcat8-lib-8.5.40-1.79.amzn1.noarch
    tomcat8-javadoc-8.5.40-1.79.amzn1.noarch

src:
    tomcat8-8.5.40-1.79.amzn1.src