tomcat-9.0.62-27.el8
エラータID: AXSA:2024-7363:01
リリース日:
2024/01/11 Thursday - 08:15
題名:
tomcat-9.0.62-27.el8
影響のあるチャネル:
Asianux Server 8 for x86_64
Severity:
Moderate
Description:
以下項目について対処しました。
[Security Fix]
- Apache Commons FileUpload には、処理対象のリクエスト
における対象ファイル数を制限していない問題があるため、
リモートの攻撃者により、アップロードの操作を介して、
サービス拒否攻撃を可能とする脆弱性が存在します。
(CVE-2023-24998)
- Apache Tomcat には、セキュア属性が設定されない問題が
あるため、リモートの攻撃者により、HTTP 経由でリバース
プロキシサーバーから受信したリクエストの RemoteIpFilter
による受信を介して、セッション Cookie の情報の漏洩を可能
とする脆弱性が存在します。(CVE-2023-28708)
- Apache Tomcat には、内部で利用している Apache Commons
FileUpload の脆弱性 CVE-2023-24998 の修正の不備に起因して
アップロードファイルの制限が迂回されてしまう問題がある
ため、リモートの攻撃者により、潜在的なサービス拒否攻撃
を可能とする脆弱性が存在します。(CVE-2023-28709)
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2023-24998
Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads. Note that, like all of the file upload limits, the new configuration option (FileUploadBase#setFileCountMax) is not enabled by default and must be explicitly configured.
Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads. Note that, like all of the file upload limits, the new configuration option (FileUploadBase#setFileCountMax) is not enabled by default and must be explicitly configured.
CVE-2023-28708
When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel.
When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel.
CVE-2023-28709
The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7, 9.0.71 to 9.0.73 and 8.5.85 to 8.5.87. If non-default HTTP connector settings were used such that the maxParameterCount could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parameters in the query string, the limit for uploaded request parts could be bypassed with the potential for a denial of service to occur.
The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7, 9.0.71 to 9.0.73 and 8.5.85 to 8.5.87. If non-default HTTP connector settings were used such that the maxParameterCount could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parameters in the query string, the limit for uploaded request parts could be bypassed with the potential for a denial of service to occur.
追加情報:
N/A
ダウンロード:
SRPMS
- tomcat-9.0.62-27.el8.src.rpm
MD5: a1a3ab803ef15bdb854ccf307a548625
SHA-256: 0f6316f5a15aa40cb394712a2ff3bf177eb75de2d1d22b3b5df3d72a0d976ff1
Size: 14.34 MB
Asianux Server 8 for x86_64
- tomcat-9.0.62-27.el8.noarch.rpm
MD5: 38f15e5885d3f1f64dc0bf10705f9346
SHA-256: d0808f351c2ea40c2d7d331a92677633e9d17ee4927f3b1a8d518c29b9d2ab4b
Size: 90.31 kB - tomcat-admin-webapps-9.0.62-27.el8.noarch.rpm
MD5: cc73328b33934f63bc711dcdfeeca184
SHA-256: 2cb44666af04e54a93c96c783393d4f0faef69e418323759f905f46f6252d93c
Size: 72.01 kB - tomcat-docs-webapp-9.0.62-27.el8.noarch.rpm
MD5: a130e8bce02452adc2c7564408d2bdab
SHA-256: 678a523107c63f361a782eb292400c67349aa3eb0f841fa85b69042ef06cf20f
Size: 728.18 kB - tomcat-el-3.0-api-9.0.62-27.el8.noarch.rpm
MD5: 930f35814bc0a656c27bab8fe34639e0
SHA-256: 0194c1c0d22595df66165e35681eab052edb71d1fc8b1e2dd3c030ece9400527
Size: 105.19 kB - tomcat-jsp-2.3-api-9.0.62-27.el8.noarch.rpm
MD5: ae3346f36af025c0128ca383fb369c10
SHA-256: 1d4bb845d3efe9a3b69a161202b71278a448c50a28697d5ceceb2233121d012f
Size: 64.05 kB - tomcat-lib-9.0.62-27.el8.noarch.rpm
MD5: 0a659484a6d57b7d4f12053aedcbb326
SHA-256: e911d3b12e2ef40918438127dd49d8c00b5f6a22d1e153eca797cb8215cd2607
Size: 5.90 MB - tomcat-servlet-4.0-api-9.0.62-27.el8.noarch.rpm
MD5: 6f920a6fcb2ea355142871197e5fecbd
SHA-256: 7ea588863d816b84f568e26fbd73bef42bc26606c703204f12fd80c0477389e3
Size: 285.11 kB - tomcat-webapps-9.0.62-27.el8.noarch.rpm
MD5: a461c20b0d1bd2a837e255ac5fff99e2
SHA-256: 23dbbe9ccbb19b1f28a5c4123db6a0471384f2b842dbdfba7d674d9234ba9f99
Size: 79.43 kB