Bug 896047 (CVE-2013-4444) - VUL-0: CVE-2013-4444: tomcat: possible remote code execution
Summary: VUL-0: CVE-2013-4444: tomcat: possible remote code execution
Status: RESOLVED FIXED
Alias: CVE-2013-4444
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other openSUSE 13.1
: P3 - Medium : Major
Target Milestone: ---
Assignee: Bo Maryniuk
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/106044/
Whiteboard: CVSSv3.1:SUSE:CVE-2013-4444:5.6:(AV:N...
Keywords:
Depends on:
Blocks:
 
Reported: 2014-09-10 14:24 UTC by Marcus Meissner
Modified: 2021-11-05 13:07 UTC (History)
4 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Marcus Meissner 2014-09-10 14:24:02 UTC
via full-disclosure

CVE-2013-4444


From: Mark Thomas <markt@apache.org>
Date: Wed, 10 Sep 2014 15:00:24 +0100
Subject: [FD] [SECURITY] CVE-2013-4444 Remote Code Execution in Apache Tomcat

CVE-2013-4444 Remote Code Execution

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected:
- - Apache Tomcat 7.0.0 to 7.0.39

Description:
In very limited circumstances, it was possible for an attacker to upload
a malicious JSP to a Tomcat server and then trigger the execution of
that JSP. While Remote Code Execution would normally be viewed as a
critical vulnerability, the circumstances under which this is possible
are, in the view of the Tomcat security team, sufficiently limited that
this vulnerability is viewed as important.
For this attack to succeed all of the following requirements must be met:
a) Using Oracle Java 1.7.0 update 25 or earlier (or any other Java
   implementation where java.io.File is vulnerable to null byte
   injection).
b) A web application must be deployed to a vulnerable version of Tomcat
   (see previous section).
c) The web application must use the Servlet 3.0 File Upload feature.
d) A file location within a deployed web application must be writeable
   by the user the Tomcat process is running as. The Tomcat security
   documentation recommends against this.
e) A custom listener for JMX connections (e.g. the JmxRemoteListener
   that is not enabled by default) must be configured and be able to
   load classes from Tomcat's common class loader (i.e. the custom JMX
   listener must be placed in Tomcat's lib directory)
f) The custom JMX listener must be bound to an address other than
   localhost for a remote attack (it is bound to localhost by default).
   If the custom JMX listener is bound to localhost, a local attack
   will still be possible.

Note that requirements b) and c) may be replaced with the following
requirement:
g) A web application is deployed that uses Apache Commons File Upload
   1.2.1 or earlier.
In this case a similar vulnerability may exist on any Servlet container,
not just Apache Tomcat.

Mitigation:
This vulnerability may be mitigated by using any one of the following
mitigations:
- - Upgrade to Oracle Java 1.7.0 update 40 or later (or any other Java
  implementation where java.io.File is not vulnerable to null byte
  injection).
- - Use OS file permissions to prevent the process Tomcat is running as
  from writing to any location within a deployed application.
- - Disable any custom JMX listeners
- - Upgrade to Apache Tomcat 7.0.40 or later

Credit:
This issue was identified by Pierre Ernst of the VMware Security
Engineering, Communications & Response group (vSECR)  and reported to
the Tomcat security team via the Pivotal security team.

References:
[1] http://tomcat.apache.org/security-7.html
Comment 1 Marcus Meissner 2014-09-10 14:27:40 UTC
SUSE:SLE-12:GA              tomcat     7.0.55  - not affected

openSUSE 12.3 has 7.0.35  - affected
openSUSE 13.1 has 7.0.42  - not affected

so we need a opensUSE 12.3 update I think
Comment 2 Marcus Meissner 2014-09-10 14:32:41 UTC
(its an old issue, not sure why they reported it now)
Comment 3 Swamp Workflow Management 2014-09-10 22:00:38 UTC
bugbot adjusting priority
Comment 4 Bo Maryniuk 2014-09-12 13:09:40 UTC
Can we close this now?
Comment 5 Marcus Meissner 2014-09-12 13:17:19 UTC
I just opened it, because openSUSE 12.3 is not fixed.
Comment 6 Duncan Mac-Vicar 2014-09-15 07:28:12 UTC
Can we just update 12.3 to 7.0.35?
Comment 7 Marcus Meissner 2014-09-15 11:33:19 UTC
it is a version 7.0.35 currently

we can update to a new version, which should be same or lower than 13.1

or we can update both 12.3 and 13.1 to 7.0.55 (current stable).
Comment 9 Marcus Meissner 2014-09-17 06:17:16 UTC
weird enough , we got this:

(this would be bug 838671 )

From: Arun Babu Neelicattu <abn@redhat.com>
Subject: [oss-security] Duplicate Request: CVE-2013-4444 as a duplicate of CVE-2013-2185
Date: Wed, 17 Sep 2014 00:10:16 -0400 (EDT)

Recently Apache Tomcat issued an advisory [1] for CVE-2013-4444 [2]. However, this flaw was reported to the Apache Tomcat Security team last year. We were instructed that Apache Tomcat team did not consider this a vulnerability. Red Hat Product Security handled this issue as CVE-2013-2185 [3] in our affected products.

We request that CVE-2013-4444 be marked as a duplicate of CVE-2013-2185.

-arun

[1] http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.40
[2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4444
[3] https://bugzilla.redhat.com/CVE-2013-2185
Comment 10 Duncan Mac-Vicar 2014-09-17 09:14:52 UTC
https://build.opensuse.org/request/show/249907
Comment 11 Marcus Meissner 2014-09-22 12:17:41 UTC
i merged this manually now, as 13.1/tomcat had lots of perhaps  changes not working for 12.3
Comment 12 Duncan Mac-Vicar 2014-10-01 11:27:14 UTC
(In reply to Marcus Meissner from comment #11)
> i merged this manually now, as 13.1/tomcat had lots of perhaps  changes not
> working for 12.3

Thanks. Can be closed then?
Comment 13 Marcus Meissner 2014-10-01 12:00:18 UTC
yes
Comment 14 Swamp Workflow Management 2014-10-01 14:04:58 UTC
openSUSE-RU-2014:1264-1: An update that fixes one vulnerability is now available.

Category: recommended (moderate)
Bug References: 896047
CVE References: CVE-2013-4444
Sources used:
openSUSE 12.3 (src):    tomcat-7.0.42-2.43.1