tomcat-9.0.62-37.el9
エラータID: AXSA:2023-6944:05
リリース日:
2023/12/12 Tuesday - 11:25
題名:
tomcat-9.0.62-37.el9
影響のあるチャネル:
MIRACLE LINUX 9 for x86_64
Severity:
Moderate
Description:
以下項目について対処しました。
[Security Fix]
- Apache Commons FileUpload には、処理対象のリクエスト
における対象ファイル数を制限していない問題があるため、
リモートの攻撃者により、アップロードの操作を介して、
サービス拒否攻撃を可能とする脆弱性が存在します。
(CVE-2023-24998)
- Apache Tomcat には、セキュア属性が設定されない問題が
あるため、リモートの攻撃者により、HTTP 経由でリバース
プロキシサーバーから受信したリクエストの RemoteIpFilter
による受信を介して、セッション Cookie の情報の漏洩を
可能とする脆弱性が存在します。(CVE-2023-28708)
- Apache Tomcat には、内部で利用している Apache Commons
FileUpload の脆弱性 CVE-2023-24998 の修正の不備に起因
してアップロードファイルの制限が迂回されてしまう問題が
あるため、リモートの攻撃者により、潜在的なサービス拒否
攻撃を可能とする脆弱性が存在します。(CVE-2023-28709)
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2023-24998
Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads. Note that, like all of the file upload limits, the new configuration option (FileUploadBase#setFileCountMax) is not enabled by default and must be explicitly configured.
Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads. Note that, like all of the file upload limits, the new configuration option (FileUploadBase#setFileCountMax) is not enabled by default and must be explicitly configured.
CVE-2023-28708
When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel.
When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel.
CVE-2023-28709
The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7, 9.0.71 to 9.0.73 and 8.5.85 to 8.5.87. If non-default HTTP connector settings were used such that the maxParameterCount could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parameters in the query string, the limit for uploaded request parts could be bypassed with the potential for a denial of service to occur.
The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7, 9.0.71 to 9.0.73 and 8.5.85 to 8.5.87. If non-default HTTP connector settings were used such that the maxParameterCount could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parameters in the query string, the limit for uploaded request parts could be bypassed with the potential for a denial of service to occur.
追加情報:
N/A
ダウンロード:
SRPMS
- tomcat-9.0.62-37.el9.src.rpm
MD5: 4f96ab951adc0ee8a5f205cf1350531d
SHA-256: eca0115d97292980905d396d7950feee16cc3140a72667fa2cc1de2397afac38
Size: 14.35 MB
Asianux Server 9 for x86_64
- tomcat-9.0.62-37.el9.noarch.rpm
MD5: 10f5e7bd3b3f545a22dc9082fc1d2caf
SHA-256: b9d9d62177a2b61c3cf4c4e2ff2360e04c3f82aaf5af6b7f59d84905d8e18788
Size: 89.22 kB - tomcat-admin-webapps-9.0.62-37.el9.noarch.rpm
MD5: 47c3338c8ff5536bfe9dd18027f9bb94
SHA-256: 7dec0f597c2babcd7c3adff6e71b0254c7da6e2a0a9d85666c7ab73d52096c5e
Size: 71.26 kB - tomcat-docs-webapp-9.0.62-37.el9.noarch.rpm
MD5: 18d1bbfca8faac3793cff980df086f6f
SHA-256: dcca14c8b041db04a3bee7358157b187a8b4ca9217f2d6cd9610d1cf7eb8ce48
Size: 670.97 kB - tomcat-el-3.0-api-9.0.62-37.el9.noarch.rpm
MD5: c9392474f655b3115dcd5db54da8cdaa
SHA-256: 36b1d9a62c33d8091f4dd1f380d2e2586c4d72d5a6842d91faf2cee2a2b0b582
Size: 104.13 kB - tomcat-jsp-2.3-api-9.0.62-37.el9.noarch.rpm
MD5: 6f7c0adad1ce062982775d95f3c7993e
SHA-256: 67f3587993109e93460eea907fbacf3e9465c7ed703aeafa11f91d4cfc4f9a86
Size: 64.03 kB - tomcat-lib-9.0.62-37.el9.noarch.rpm
MD5: a266f684614088075b3ff2d9a74b77e0
SHA-256: 58c91212fd80be426f6bff99480ee27394ce714702041ecb42b50ec0926d30ab
Size: 5.81 MB - tomcat-servlet-4.0-api-9.0.62-37.el9.noarch.rpm
MD5: 9be46fcf3cf3c1ea6782aff171acc7a0
SHA-256: e8a9b976526ffca3dd090d0a4d38851b598413a8dd65f23bf3cdb278120db443
Size: 282.55 kB - tomcat-webapps-9.0.62-37.el9.noarch.rpm
MD5: 59df7ce3d182c26c8d290f7983664847
SHA-256: 54603ed7be7b16c779e7119188fee286ad906dd4acef67433c66549e07daf6b9
Size: 79.08 kB