CVE-2015-5351
Published: 24 February 2016
The (1) Manager and (2) Host Manager applications in Apache Tomcat 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 establish sessions and send CSRF tokens for arbitrary new requests, which allows remote attackers to bypass a CSRF protection mechanism by using a token.
From the Ubuntu Security Team
It was discovered that the Tomcat Manager and Host Manager applications incorrectly handled new requests. A remote attacker could possibly use this issue to bypass CSRF protection mechanisms.
Priority
Status
Package | Release | Status |
---|---|---|
tomcat6 Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
bionic |
Does not exist
|
|
precise |
Not vulnerable
(code not present)
|
|
trusty |
Released
(6.0.39-1ubuntu0.1)
|
|
upstream |
Released
(6.0.45)
|
|
wily |
Ignored
(end of life)
|
|
xenial |
Not vulnerable
(6.0.45+dfsg-1)
|
|
yakkety |
Does not exist
|
|
zesty |
Does not exist
|
|
Patches: upstream: http://svn.apache.org/viewvc?view=revision&revision=1720661 upstream: http://svn.apache.org/viewvc?view=revision&revision=1720655 |
||
tomcat7 Launchpad, Ubuntu, Debian |
artful |
Not vulnerable
(7.0.68-1)
|
bionic |
Not vulnerable
(7.0.68-1)
|
|
precise |
Ignored
(end of life)
|
|
trusty |
Released
(7.0.52-1ubuntu0.6)
|
|
upstream |
Released
(7.0.68-1)
|
|
wily |
Released
(7.0.64-1ubuntu0.3)
|
|
xenial |
Not vulnerable
(7.0.68-1)
|
|
yakkety |
Not vulnerable
(7.0.68-1)
|
|
zesty |
Not vulnerable
(7.0.68-1)
|
|
Patches: upstream: http://svn.apache.org/viewvc?view=revision&revision=1720661 upstream: http://svn.apache.org/viewvc?view=revision&revision=1720663 |
||
tomcat8 Launchpad, Ubuntu, Debian |
artful |
Not vulnerable
(8.0.32-1ubuntu1)
|
bionic |
Not vulnerable
(8.0.32-1ubuntu1)
|
|
precise |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Released
(8.0.32-1)
|
|
wily |
Ignored
(end of life)
|
|
xenial |
Not vulnerable
(8.0.32-1ubuntu1)
|
|
yakkety |
Not vulnerable
(8.0.32-1ubuntu1)
|
|
zesty |
Not vulnerable
(8.0.32-1ubuntu1)
|
|
Patches: upstream: http://svn.apache.org/viewvc?view=revision&revision=1720658 upstream: http://svn.apache.org/viewvc?view=revision&revision=1720660 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |