Hello,

I am using Tomcat Version: apache-tomcat-7.0.50
OS: Red Hat Enterprise Linux Server release 6.5 (Santiago) 64bit

Issue:  There were 2 vulnerabilities found and need to know if there are 
configurations or patches available to resolve these.


1.       Tomcat was configured to use SSL https.  It was found that there is an 
input validation vulnerability that exists.

The error is due to improper filtering of HTTP requests, which could allow 
users to conduct request attacks.



In server.xml these are enabled:
...
  <Connector executor="tomcatThreadPool"
               port="8080" protocol="HTTP/1.1"
               connectionTimeout="20000"
               redirectPort="8443" />

<Connector SSLEnabled="true"
keystoreType="PKCS12"
acceptCount="100"
clientAuth="false"
connectionTimeout="60000" disableUploadTimeout="false"
enableLookups="false"
SSLCertificateFile="/pathto/CERT.crt"
SSLCertificateKeyFile="pathto/KEY.key"
SSLPassword="........"
SSLCertificateChainFile="/pathto/Root.crt"
keyAlias="......."
maxHttpHeaderSize="8192"
maxThreads="150" minSpareThreads="5"
noCompressionUserAgents="gozilla, traviata" port="8443"
scheme="https" secure="true"
sslProtocol="TLSv1.2"/>

<Connector port="8009" protocol="AJP/1.3" redirectPort="8443" />
...




To prevent and restrict user redirection of https pages, the following solution 
was also added and thought this may resolve this vulnerability:
In /webapps/WEB-INF/web.xml -  does this web.xml update verify remediation on 
this vulnerability issue?  Or is there another solution that I should use?

WEB-INF/web.xml:
<security-constraint>
         <web-resource-collection>
             <web-resource-name>HTTPSOnly</web-resource-name>
             <url-pattern>/*</url-pattern>
         </web-resource-collection>
         <user-data-constraint>
             <transport-guarantee>CONFIDENTIAL</transport-guarantee>
         </user-data-constraint>
     </security-constraint>
     <security-constraint>
         <web-resource-collection>
             <web-resource-name>HTTPSOrHTTP</web-resource-name>
             <url-pattern>*.ico</url-pattern>
             <url-pattern>/img/*</url-pattern>
             <url-pattern>/css/*</url-pattern>
         </web-resource-collection>
         <user-data-constraint>
             <transport-guarantee>NONE</transport-guarantee>
         </user-data-constraint>
     </security-constraint>





2.       We are using Samba and NetBIOS Access through Tomcat to auto detect 
Windows usernames internally, I am using the jcifs.jar in the Tomcat lib to do 
this which to identifies the user's Windows username for a web application.

a.       Is there a configuration we could use instead to remediate this 
vulnerability reported in Tomcat 7?

b.      Or would upgrading to Tomcat version 9 eliminate these 2 
vulnerabilities ?



Example of what was found:
Vulnerability Title

Result


1.       Apache Tomcat Input Validation Security Bypass Vulnerability

Apache Tomcat Input Validation Security Bypass Vulnerability detected on 8443 
port.<title>Apache Tomcat/7.0.50 - Error report</title>Apache Tomcat Input 
Validation Security Bypass Vulnerability detected on 8080 port.


2.       Null Session/Password NetBIOS Access



Thanks for any information

________________________________
Larry Taylor

Reply via email to