Full Disclosure mailing list archives
Re: [ MDVSA-2010:176 ] tomcat5
From: "Raj Mathur (राज माथुर)" <raju () linux-delhi org>
Date: Mon, 13 Sep 2010 08:49:14 +0530
On Sunday 12 Sep 2010, security () mandriva com wrote:
Package : tomcat5
Multiple vulnerabilities has been found and corrected in tomcat5:
Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0
through 4.1.36 does not properly handle (1) double quote (")
characters or (2) \%5C (encoded backslash) sequences in a cookie
value, which might cause sensitive information such as session IDs
to be leaked to remote attackers and enable session hijacking
attacks. NOTE: this issue exists because of an incomplete fix for
CVE-2007-3385 (CVE-2007-5333).
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0
through 6.0.18, and possibly earlier versions normalizes the target
pathname before filtering the query string when using the
RequestDispatcher method, which allows remote attackers to bypass
intended access restrictions and conduct directory traversal attacks
via .. (dot dot) sequences and the WEB-INF directory in a Request
(CVE-2008-5515).
Please correct the package name in the vulnerability report. Regards, -- Raj -- Raj Mathur raju () kandalaya org http://kandalaya.org/ GPG: 78D4 FC67 367F 40E2 0DD5 0FEF C968 D0EF CC68 D17F PsyTrance & Chill: http://schizoid.in/ || It is the mind that moves _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- [ MDVSA-2010:176 ] tomcat5 security (Sep 12)
- Re: [ MDVSA-2010:176 ] tomcat5 Raj Mathur (राज माथुर) (Sep 12)
