Secunia Security Advisory - A vulnerability has been discovered in Apache Tomcat, which can be exploited by malicious people to conduct cross-site request forgery attacks.
eef441d29c407d197ea94808bf5a6c78e8a6828095e3c9fe39ce3fc4b286826a
----------------------------------------------------------------------
Proof-of-Concept (PoC) and Extended Analysis available for customers.
Get a free trial, contact sales@secunia.com
----------------------------------------------------------------------
TITLE:
Apache Tomcat Web Application Manager / Host Manager Cross-Site
Request Forgery
SECUNIA ADVISORY ID:
SA39261
VERIFY ADVISORY:
http://secunia.com/advisories/39261/
DESCRIPTION:
A vulnerability has been discovered in Apache Tomcat, which can be
exploited by malicious people to conduct cross-site request forgery
attacks.
The Tomcat Web Application Manager and the Host Manager allow users
to perform certain actions via HTTP requests without performing any
validation checks to verify the requests. This can be exploited to
perform administrative actions (e.g. to stop or undeploy an
application, or add a virtual host) if a logged-in administrative
user visits a malicious web site.
The vulnerability is confirmed in version 5.5.28 and 6.0.26. Other
versions may also be affected.
SOLUTION:
Close the browser after an administrative session in the Tomcat Web
Application Manager or the Host Manager. Do not browse untrusted web
sites or follow untrusted links while being logged-in to the
management interface.
PROVIDED AND/OR DISCOVERED BY:
Reported as enhancement for Tomcat version 7. Reported as
vulnerability in version 5.x and 6.x by Swatej Kumar via Secunia.
OTHER REFERENCES:
http://svn.eu.apache.org/repos/asf/tomcat/trunk/webapps/docs/changelog.xml
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------