Hi,
We are in the process of upgrading BlazeDS in Flex+Java web app,
because when we run OWASP Dependency Check 1.4.3, it showed a High
Vulnerabilities in 1 file:
Dependency CPE GAV Highest Severity CVE Count CPE Confidence Evidence
Count
cre.war: blazeds-core-4.0.0.14931.jar cpe:/a:adobe:blazeds:4.0.0.14931
High 2 LOW 7
However, when we tried to do the same with Apache BlazeDS 4.7.2, we got even
more of those:
cre.war: flex-messaging-core-4.7.2.jar cpe:/a:apache:flex:4.7.2
org.apache.flex.blazeds:flex-messaging-core:4.7.2 Medium 1 LOW 16
cre.war: flex-messaging-opt-tomcat7-4.7.2.jar cpe:/a:apache:flex:4.7.2
cpe:/a:apache:tomcat:7.0.0
org.apache.flex.blazeds:flex-messaging-opt-tomcat7:4.7.2 High 59 MEDIUM 16
More details (on 4.7.2 - I only put High Severity, there is lots and lots of
Mediums):
cre.war: flex-messaging-opt-tomcat7-4.7.2.jar
File Path:
C:\web\cre\dist\cre.war\WEB-INF\lib\flex-messaging-opt-tomcat7-4.7.2.jar
MD5: 8e188c61285fa087116df2a350571c1c
SHA1: e34b3ab4b6d72384a44e15b992801bc4849b5412
Evidence
Identifiers
•cpe: cpe:/a:apache:flex:4.7.2 Confidence:LOW suppress
•cpe: cpe:/a:apache:tomcat:7.0.0 Confidence:MEDIUM suppress
•maven: org.apache.flex.blazeds:flex-messaging-opt-tomcat7:4.7.2
Confidence:HIGHEST
Published Vulnerabilities
CVE-2016-6325 suppress
Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls
The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web
Server 3.0, and JBoss EWS 2 uses weak permissions for (1)
/etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local
users to gain privileges by leveraging membership in the tomcat group.
•CONFIRM -
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
•CONFIRM - https://bugzilla.redhat.com/show_bug.cgi?id=1367447
•REDHAT - RHSA-2016:2045
•REDHAT - RHSA-2016:2046
Vulnerable Software & Versions:
•cpe:/a:apache:tomcat:-
CVE-2016-5425 suppress
Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-264 Permissions, Privileges, and Access Controls
The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS,
Oracle Linux, and possibly other Linux distributions uses weak permissions
for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root
privileges by leveraging membership in the tomcat group.
•BID - 93472
•CONFIRM -
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
•MISC -
http://legalhackers.com/advisories/Tomcat-RedHat-Pkgs-Root-PrivEsc-Exploit-CVE-2016-5425.html
•MISC -
http://packetstormsecurity.com/files/139041/Apache-Tomcat-8-7-6-Privilege-Escalation.html
•MLIST - [oss-security] 20161010 CVE-2016-5425 - Apache Tomcat packaging on
RedHat-based distros - Root Privilege Escalation (affecting CentOS, Fedora,
OracleLinux, RedHat etc.)
•REDHAT - RHSA-2016:2046
Vulnerable Software & Versions:
•cpe:/a:apache:tomcat
CVE-2016-3092 suppress
Severity: High
CVSS Score: 7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)
CWE: CWE-20 Improper Input Validation
The MultipartStream class in Apache Commons Fileupload before 1.3.2, as used
in Apache Tomcat 7.x before 7.0.70, 8.x before 8.0.36, 8.5.x before 8.5.3,
and 9.x before 9.0.0.M7 and other products, allows remote attackers to cause
a denial of service (CPU consumption) via a long boundary string.
•BID - 91453
•CONFIRM - http://svn.apache.org/viewvc?view=revision&revision=1743480
•CONFIRM - http://svn.apache.org/viewvc?view=revision&revision=1743722
•CONFIRM - http://svn.apache.org/viewvc?view=revision&revision=1743738
•CONFIRM - http://svn.apache.org/viewvc?view=revision&revision=1743742
•CONFIRM - http://tomcat.apache.org/security-7.html
•CONFIRM - http://tomcat.apache.org/security-8.html
•CONFIRM - http://tomcat.apache.org/security-9.html
•CONFIRM -
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
•CONFIRM - https://bugzilla.redhat.com/show_bug.cgi?id=1349468
•CONFIRM -
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05204371
•CONFIRM -
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289840
•CONFIRM -
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324759
•DEBIAN - DSA-3609
•DEBIAN - DSA-3611
•DEBIAN - DSA-3614
•JVN - JVN#89379547
•JVNDB - JVNDB-2016-000121
•MLIST - [dev] 20160621 CVE-2016-3092: Apache Commons Fileupload information
disclosure vulnerability
•UBUNTU - USN-3024-1
•UBUNTU - USN-3027-1
Vulnerable Software & Versions: (show all)
•cpe:/a:apache:tomcat:7.0.0:beta
•...
CVE-2016-1240 suppress
Severity: High
CVSS Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CWE: CWE-20 Improper Input Validation
The Tomcat init script in the tomcat7 package before 7.0.56-3+deb8u4 and
tomcat8 package before 8.0.14-1+deb8u3 on Debian jessie and the tomcat6 and
libtomcat6-java packages before 6.0.35-1ubuntu3.8 on Ubuntu 12.04 LTS, the
tomcat7 and libtomcat7-java packages before 7.0.52-1ubuntu0.7 on Ubuntu
14.04 LTS, and tomcat8 and libtomcat8-java packages before 8.0.32-1ubuntu1.2
on Ubuntu 16.04 LTS allows local users with access to the tomcat account to
gain root privileges via a symlink attack on the Catalina log file, as
demonstrated by /var/log/tomcat7/catalina.out.
•BUGTRAQ - 20161001 CVE-2016-1240 - Tomcat packaging on Debian-based distros
- Local Root Privilege Escalation
•DEBIAN - DSA-3669
•DEBIAN - DSA-3670
•MISC -
http://legalhackers.com/advisories/Tomcat-DebPkgs-Root-Privilege-Escalation-Exploit-CVE-2016-1240.html
•SECTRACK - 1036845
•UBUNTU - USN-3081-1
Vulnerable Software & Versions: (show all)
•cpe:/a:apache:tomcat:7.0
•...
CVE-2016-0763 suppress
Severity: Medium
CVSS Score: 6.5 (AV:N/AC:L/Au:S/C:P/I:P/A:P)
CWE: CWE-264 Permissions, Privileges, and Access Controls
The setGlobalContext method in
org/apache/naming/factory/ResourceLinkFactory.java in Apache Tomcat 7.x
before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M3 does not consider
whether ResourceLinkFactory.setGlobalContext callers are authorized, which
allows remote authenticated users to bypass intended SecurityManager
restrictions and read or write to arbitrary application data, or cause a
denial of service (application disruption), via a web application that sets
a crafted global context.
•BUGTRAQ - 20160222 [SECURITY] CVE-2016-0763 Apache Tomcat Security Manager
Bypass
•CONFIRM - http://svn.apache.org/viewvc?view=revision&revision=1725926
•CONFIRM - http://svn.apache.org/viewvc?view=revision&revision=1725929
•CONFIRM - http://svn.apache.org/viewvc?view=revision&revision=1725931
•CONFIRM - http://tomcat.apache.org/security-7.html
•CONFIRM - http://tomcat.apache.org/security-8.html
•CONFIRM - http://tomcat.apache.org/security-9.html
•CONFIRM -
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
•CONFIRM -
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442
•CONFIRM -
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626
•CONFIRM -
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755
•DEBIAN - DSA-3530
•DEBIAN - DSA-3552
•DEBIAN - DSA-3609
•UBUNTU - USN-3024-1
Vulnerable Software & Versions: (show all)
•cpe:/a:apache:tomcat:7.0.0:beta
•...
CVE-2014-0230 suppress
Severity: High
CVSS Score: 7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)
CWE: CWE-399 Resource Management Errors
Apache Tomcat 6.x before 6.0.44, 7.x before 7.0.55, and 8.x before 8.0.9
does not properly handle cases where an HTTP response occurs before
finishing the reading of an entire request body, which allows remote
attackers to cause a denial of service (thread consumption) via a series of
aborted upload attempts.
•CONFIRM - http://svn.apache.org/viewvc?view=revision&revision=1603770
•CONFIRM - http://svn.apache.org/viewvc?view=revision&revision=1603775
•CONFIRM - http://svn.apache.org/viewvc?view=revision&revision=1603779
•CONFIRM - http://tomcat.apache.org/security-6.html
•CONFIRM - http://tomcat.apache.org/security-7.html
•CONFIRM - http://tomcat.apache.org/security-8.html
•CONFIRM -
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
•CONFIRM -
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
•CONFIRM -
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964
•DEBIAN - DSA-3530
•HP - HPSBOV03503
•HP - HPSBUX03561
•MLIST - [oss-security] 20150409 Apache Tomcat partial file upload DoS
CVE-2014-0230
•MLIST - [tomcat-announce] 20150505 [SECURITY] CVE-2014-0230: Apache Tomcat
DoS
•REDHAT - RHSA-2016:0595
•REDHAT - RHSA-2016:0596
•REDHAT - RHSA-2016:0597
•REDHAT - RHSA-2016:0598
•REDHAT - RHSA-2016:0599
Vulnerable Software & Versions: (show all)
•cpe:/a:apache:tomcat:7.0.0:beta
•...
CVE-2014-0050 suppress
Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-264 Permissions, Privileges, and Access Controls
MultipartStream.java in Apache Commons FileUpload before 1.3.1, as used in
Apache Tomcat, JBoss Web, and other products, allows remote attackers to
cause a denial of service (infinite loop and CPU consumption) via a crafted
Content-Type header that bypasses a loop's intended exit conditions.
•BID - 65400
•BUGTRAQ - 20140625 NEW VMSA-2014-0007 - VMware product updates address
security vulnerabilities in Apache Struts library
•BUGTRAQ - 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates
address security vulnerabilities
•CONFIRM - http://advisories.mageia.org/MGASA-2014-0110.html
•CONFIRM - http://svn.apache.org/r1565143
•CONFIRM - http://tomcat.apache.org/security-7.html
•CONFIRM - http://tomcat.apache.org/security-8.html
•CONFIRM - http://www-01.ibm.com/support/docview.wss?uid=swg21669554
•CONFIRM - http://www-01.ibm.com/support/docview.wss?uid=swg21675432
•CONFIRM - http://www-01.ibm.com/support/docview.wss?uid=swg21676091
•CONFIRM - http://www-01.ibm.com/support/docview.wss?uid=swg21676092
•CONFIRM - http://www-01.ibm.com/support/docview.wss?uid=swg21676401
•CONFIRM - http://www-01.ibm.com/support/docview.wss?uid=swg21676403
•CONFIRM - http://www-01.ibm.com/support/docview.wss?uid=swg21676405
•CONFIRM - http://www-01.ibm.com/support/docview.wss?uid=swg21676410
•CONFIRM - http://www-01.ibm.com/support/docview.wss?uid=swg21676656
•CONFIRM - http://www-01.ibm.com/support/docview.wss?uid=swg21676853
•CONFIRM - http://www-01.ibm.com/support/docview.wss?uid=swg21677691
•CONFIRM - http://www-01.ibm.com/support/docview.wss?uid=swg21677724
•CONFIRM - http://www-01.ibm.com/support/docview.wss?uid=swg21681214
•CONFIRM -
http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-015/index.html
•CONFIRM -
http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-016/index.html
•CONFIRM -
http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-017/index.html
•CONFIRM -
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-350733.htm
•CONFIRM -
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
•CONFIRM -
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
•CONFIRM -
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
•CONFIRM -
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
•CONFIRM -
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
•CONFIRM -
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
•CONFIRM -
http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
•CONFIRM - http://www.vmware.com/security/advisories/VMSA-2014-0007.html
•CONFIRM - http://www.vmware.com/security/advisories/VMSA-2014-0012.html
•CONFIRM - https://bugzilla.redhat.com/show_bug.cgi?id=1062337
•CONFIRM -
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755
•FULLDISC - 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates
address security vulnerabilities
•HP - HPSBGN03329
•JVN - JVN#14876762
•JVNDB - JVNDB-2014-000017
•MANDRIVA - MDVSA-2015:084
•MISC -
http://blog.spiderlabs.com/2014/02/cve-2014-0050-exploit-with-boundaries-loops-without-boundaries.html
•MISC -
http://packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.html
•MLIST - [commons-dev] 20140206 [SECURITY] CVE-2014-0050 Apache Commons
FileUpload and Apache Tomcat DoS
•REDHAT - RHSA-2014:0400
Vulnerable Software & Versions: (show all)
•cpe:/a:apache:tomcat:7.0.0:beta
•...
CVE-2013-2185 suppress
Severity: High
CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CWE: CWE-20 Improper Input Validation
** DISPUTED ** The readObject method in the DiskFileItem class in Apache
Tomcat and JBoss Web, as used in Red Hat JBoss Enterprise Application
Platform 6.1.0 and Red Hat JBoss Portal 6.0.0, allows remote attackers to
write to arbitrary files via a NULL byte in a file name in a serialized
instance, a similar issue to CVE-2013-2186. NOTE: this issue is reportedly
disputed by the Apache Tomcat team, although Red Hat considers it a
vulnerability. The dispute appears to regard whether it is the
responsibility of applications to avoid providing untrusted data to be
deserialized, or whether this class should inherently protect against this
issue.
•MLIST - [oss-security] 20130905 Re: CVE-2013-2185 / Tomcat
•MLIST - [oss-security] 20141024 Re: Duplicate Request: CVE-2013-4444 as a
duplicate of CVE-2013-2185
•REDHAT - RHSA-2013:1193
•REDHAT - RHSA-2013:1194
•REDHAT - RHSA-2013:1265
Vulnerable Software & Versions: (show all)
•cpe:/a:apache:tomcat:7.0.39 and all previous versions
Can anyone look into that?
What would you recommend?
Thank you,
Oleg.
--
View this message in context:
http://apache-flex-users.2333346.n4.nabble.com/Security-vulnerabilities-in-BlazeDS-4-7-2-tp14175.html
Sent from the Apache Flex Users mailing list archive at Nabble.com.