Bug 13951

Summary: [CVE 21] tomcat 9.0.37 CVEs found
Product: [ROSA-based products] ROSA Fresh Reporter: Yury <y.tumanov>
Component: System (kernel, glibc, systemd, bash, PAM...)Assignee: ROSA Linux Bugs <bugs>
Status: VERIFIED FIXED QA Contact: ROSA Linux Bugs <bugs>
Severity: critical    
Priority: Highest CC: a.proklov, e.kosachev, e.malashin, s.matveev, v.potapov, y.tumanov
Version: AllFlags: v.potapov: qa_verified+
e.kosachev: secteam_verified+
a.proklov: published+
Target Milestone: ---   
Hardware: All   
OS: Linux   
URL: CVE-2020-9484, CVE-2021-25122, CVE-2021-42340, CVE-2022-25762, CVE-2022-34305, CVE-2023-28709, CVE-2023-41080, CVE-2023-42794, CVE-2023-42795, CVE-2023-45648, CVE-2023-44487,
Whiteboard:
Platform: 2021.1 ROSA Vulnerability identifier:
RPM Package: ISO-related:
Bad POT generating: Upstream:

Description Yury 2023-10-18 20:31:47 MSK
Please patch CVEs for package tomcat version 9.0.37
  
INFO (CVEs are): tomcat 9.0.37
 cves found
CVE-2020-9484
Desc: When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configured with sessionAttributeValueClassNameFilter="null" (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and d) the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control. Note that all of conditions a) to d) must be true for the attack to succeed.
Link: https://nvd.nist.gov/vuln/detail/CVE-2020-9484
Severity: HIGH
CVE-2021-25122
Desc: When responding to new h2c connection requests, Apache Tomcat versions 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41 and 8.5.0 to 8.5.61 could duplicate request headers and a limited amount of request body from one request to another meaning user A and user B could both see the results of user A's request.
Link: https://nvd.nist.gov/vuln/detail/CVE-2021-25122
Severity: HIGH
CVE-2021-42340
Desc: The fix for bug 63362 present in Apache Tomcat 10.1.0-M1 to 10.1.0-M5, 10.0.0-M1 to 10.0.11, 9.0.40 to 9.0.53 and 8.5.60 to 8.5.71 introduced a memory leak. The object introduced to collect metrics for HTTP upgrade connections was not released for WebSocket connections once the connection was closed. This created a memory leak that, over time, could lead to a denial of service via an OutOfMemoryError.
Link: https://nvd.nist.gov/vuln/detail/CVE-2021-42340
Severity: HIGH
CVE-2022-25762
Desc: If a web application sends a WebSocket message concurrently with the WebSocket connection closing when running on Apache Tomcat 8.5.0 to 8.5.75 or Apache Tomcat 9.0.0.M1 to 9.0.20, it is possible that the application will continue to use the socket after it has been closed. The error handling triggered in this case could cause the a pooled object to be placed in the pool twice. This could result in subsequent connections using the same object concurrently which could result in data being returned to the wrong use and/or other errors.
Link: https://nvd.nist.gov/vuln/detail/CVE-2022-25762
Severity: HIGH
CVE-2022-34305
Desc: In Apache Tomcat 10.1.0-M1 to 10.1.0-M16, 10.0.0-M1 to 10.0.22, 9.0.30 to 9.0.64 and 8.5.50 to 8.5.81 the Form authentication example in the examples web application displayed user provided data without filtering, exposing a XSS vulnerability.
Link: https://nvd.nist.gov/vuln/detail/CVE-2022-34305
Severity: MEDIUM
CVE-2023-28709
Desc: The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7, 9.0.71 to 9.0.73 and 8.5.85 to 8.5.87. If non-default HTTP       connector settings were used such that the maxParameterCount could be reached using query string parameters and a request was       submitted that supplied exactly maxParameterCount parameters in the query string, the limit for uploaded request parts could be bypassed with the potential for a denial of service to occur.





Link: https://nvd.nist.gov/vuln/detail/CVE-2023-28709
Severity: HIGH
CVE-2023-41080
Desc: URL Redirection to Untrusted Site ('Open Redirect') vulnerability in FORM authentication feature Apache Tomcat.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.0.12, from 9.0.0-M1 through 9.0.79 and from 8.5.0 through 8.5.92.

The vulnerability is limited to the ROOT (default) web application.
Link: https://nvd.nist.gov/vuln/detail/CVE-2023-41080
Severity: MEDIUM
CVE-2023-42794
Desc: Incomplete Cleanup vulnerability in Apache Tomcat.

The internal fork of Commons FileUpload packaged with Apache Tomcat 9.0.70 through 9.0.80 and 8.5.85 through 8.5.93 included an unreleased, 
in progress refactoring that exposed a potential denial of service on 
Windows if a web application opened a stream for an uploaded file but 
failed to close the stream. The file would never be deleted from disk 
creating the possibility of an eventual denial of service due to the 
disk being full.

Users are recommended to upgrade to version 9.0.81 onwards or 8.5.94 onwards, which fixes the issue.


Link: https://nvd.nist.gov/vuln/detail/CVE-2023-42794
Severity: HIGH
CVE-2023-42795
Desc: Incomplete Cleanup vulnerability in Apache Tomcat.When recycling various internal objects in Apache Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.80 and from 8.5.0 through 8.5.93, an error could 
cause Tomcat to skip some parts of the recycling process leading to 
information leaking from the current request/response to the next.

Users are recommended to upgrade to version 11.0.0-M12 onwards, 10.1.14 onwards, 9.0.81 onwards or 8.5.94 onwards, which fixes the issue.


Link: https://nvd.nist.gov/vuln/detail/CVE-2023-42795
Severity: MEDIUM
CVE-2023-45648
Desc: Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.81 and from 8.5.0 through 8.5.93 did not correctly parse HTTP trailer headers. A specially 
crafted, invalid trailer header could cause Tomcat to treat a single 
request as multiple requests leading to the possibility of request 
smuggling when behind a reverse proxy.

Users are recommended to upgrade to version 11.0.0-M12 onwards, 10.1.14 onwards, 9.0.81 onwards or 8.5.94 onwards, which fix the issue.


Link: https://nvd.nist.gov/vuln/detail/CVE-2023-45648
Severity: MEDIUM
CVE-2023-44487
Desc: The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
Link: https://nvd.nist.gov/vuln/detail/CVE-2023-44487
Severity: HIGH
Comment 1 Aleksandr Proklov 2023-11-20 08:37:15 MSK
CVE-2022-25762 непонятно как попала сюда, она в нашей версии уже закрыта должна быть 

Уязвимости закрыты патчами. версия 9.0.83 у нас не собирается уже, пытаться откатить код я не стал.

https://abf.io/build_lists/4832214 (х64)
https://abf.io/build_lists/4832215
Comment 2 e.malashin@rosalinux.ru 2023-11-20 17:29:29 MSK
The update sent to testings
Comment 3 Vladimir Potapov 2023-11-24 11:38:31 MSK
tomcat-9.0.37-4
https://abf.io/build_lists/4832214 (х64)
https://abf.io/build_lists/4832215
****************************** Advisory **************************
CVEs fixed by patches
******************************************************************
QA Verified
Comment 4 Eduard 2024-05-14 11:49:49 MSK
*******************************************************
Secteam_verified
*******************************************************
https://abf.rosalinux.ru/advisories/ROSA-SA-2023-2258
https://abf.rosalinux.ru/advisories/ROSA-SA-2024-2418
*******************************************************