#VU64553 Permissions, Privileges, and Access Controls in Apache Tomcat - CVE-2014-0119


Vulnerability identifier: #VU64553

Vulnerability risk: Medium

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2014-0119

CWE-ID: CWE-264

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Apache Tomcat
Server applications / Web servers

Vendor: Apache Foundation

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to Apache Tomcat does not properly constrain the class loader that accesses the XML parser used with an XSLT stylesheet. A remote attacker can read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, or read files associated with different web applications on a single Tomcat instance via a crafted web application.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Apache Tomcat: 6.0.0 - 6.0.39, 7.0.0 - 7.0.53, 8.0.0 RC10 - 8.0.5


External links
https://advisories.mageia.org/MGASA-2014-0268.html
https://marc.info/?l=bugtraq&m=141017844705317&w=2
https://marc.info/?l=bugtraq&m=144498216801440&w=2
https://rhn.redhat.com/errata/RHSA-2015-0675.html
https://rhn.redhat.com/errata/RHSA-2015-0720.html
https://rhn.redhat.com/errata/RHSA-2015-0765.html
https://seclists.org/fulldisclosure/2014/Dec/23
https://seclists.org/fulldisclosure/2014/May/141
https://secunia.com/advisories/59732
https://secunia.com/advisories/59873
https://secunia.com/advisories/60729
https://svn.apache.org/viewvc?view=revision&revision=1588193
https://svn.apache.org/viewvc?view=revision&revision=1588199
https://svn.apache.org/viewvc?view=revision&revision=1589640
https://svn.apache.org/viewvc?view=revision&revision=1589837
https://svn.apache.org/viewvc?view=revision&revision=1589980
https://svn.apache.org/viewvc?view=revision&revision=1589983
https://svn.apache.org/viewvc?view=revision&revision=1589985
https://svn.apache.org/viewvc?view=revision&revision=1589990
https://svn.apache.org/viewvc?view=revision&revision=1589992
https://svn.apache.org/viewvc?view=revision&revision=1589997
https://svn.apache.org/viewvc?view=revision&revision=1590028
https://svn.apache.org/viewvc?view=revision&revision=1590036
https://svn.apache.org/viewvc?view=revision&revision=1593815
https://svn.apache.org/viewvc?view=revision&revision=1593821
https://tomcat.apache.org/security-6.html
https://tomcat.apache.org/security-7.html
https://tomcat.apache.org/security-8.html
https://www.debian.org/security/2016/dsa-3530
https://www.debian.org/security/2016/dsa-3552
https://www.mandriva.com/security/advisories?name=MDVSA-2015:052
https://www.mandriva.com/security/advisories?name=MDVSA-2015:053
https://www.mandriva.com/security/advisories?name=MDVSA-2015:084
https://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
https://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
https://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
https://www.securityfocus.com/archive/1/534161/100/0/threaded
https://www.securityfocus.com/bid/67669
https://www.securitytracker.com/id/1030298
https://www.ubuntu.com/usn/USN-2654-1
https://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://www-01.ibm.com/support/docview.wss?uid=swg21678231
https://www-01.ibm.com/support/docview.wss?uid=swg21681528
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability