漏洞信息详情
Apache Tomcat JULI日志组件默认安全策略漏洞
- CNNVD编号:CNNVD-200712-325
- 危害等级: 低危
- CVE编号: CVE-2007-5342
- 漏洞类型: 权限许可和访问控制问题
- 发布时间: 2007-05-16
- 威胁类型: 远程
- 更新时间: 2019-04-03
- 厂 商: apache
- 漏洞来源: Delian Krustev
漏洞简介
Apache Tomcat是一个流行的开放源码的jsP应用服务器程序。
Apache Tomcat的JULI日志组件允许Web应用提供自己的日志配置,默认的安全策略没有限制这种配置,允许不可信任的Web应用添加文件,或覆盖Tomcat进程拥有权限的已有文件。
漏洞公告
目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
http://svn.apache.org/viewvc/tomcat/trunk/conf/catalina.policy?r1=606594&r2=606593&pathrev=606594&view=patch
参考网址
来源:SECUNIA
链接:http://secunia.com/advisories/28915
来源:REDHAT
链接:http://www.redhat.com/support/errata/RHSA-2008-0834.HTML
来源:SECUNIA
链接:http://secunia.com/advisories/28317
来源:XF
链接:https://exchange.xforce.ibmcloud.com/vulnerabilities/39201
来源:VUPEN
链接:http://www.vupen.com/english/advisories/2008/2823
来源:CONFIRM
链接:http://tomcat.apache.org/security-5.HTML
来源:BID
链接:http://www.securityfocus.com/bid/31681
来源:VUPEN
链接:http://www.vupen.com/english/advisories/2008/2780
来源:SECUNIA
链接:http://secunia.com/advisories/30676
来源:REDHAT
链接:http://www.redhat.com/support/errata/RHSA-2008-0195.HTML
来源:REDHAT
链接:http://www.redhat.com/support/errata/RHSA-2008-0042.HTML
来源:MLIST
链接:https://lists.apache.org/thread.HTML/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E
来源:CONFIRM
链接:http://tomcat.apache.org/security-6.HTML
来源:MLIST
链接:https://lists.apache.org/thread.HTML/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E
来源:SECUNIA
链接:http://secunia.com/advisories/37460
来源:FEDORA
链接:https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00315.HTML
来源:SECUNIA
链接:http://secunia.com/advisories/57126
来源:REDHAT
链接:http://www.redhat.com/support/errata/RHSA-2008-0832.HTML
来源:MISC
链接:http://svn.apache.org/viewvc?view=rev&revision=606594
来源:CONFIRM
链接:http://support.CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple.com/kb/HT3216
来源:CONFIRM
链接:http://www.vmware.com/security/advisories/VMSA-2008-0010.HTML
来源:GENTOO
链接:http://security.gentoo.org/glsa/glsa-200804-10.xml
来源:BUGTRAQ
链接:http://www.securityfocus.com/archive/1/507985/100/0/threaded
来源:HP
链接:http://marc.info/?l=bugtraq&m=139344343412337&w=2
来源:SECUNIA
链接:http://secunia.com/advisories/28274
来源:VUPEN
链接:http://www.vupen.com/english/advisories/2009/3316
来源:REDHAT
链接:http://www.redhat.com/support/errata/RHSA-2008-0831.HTML
来源:SECUNIA
链接:http://secunia.com/advisories/32120
来源:REDHAT
链接:http://www.redhat.com/support/errata/RHSA-2008-0862.HTML
来源:CONFIRM
链接:http://www.vmware.com/security/advisories/VMSA-2009-0016.HTML
来源:OVAL
链接:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10417
来源:CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple
链接:http://lists.CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple.com/archives/security-announce/2008/Oct/msg00001.HTML
来源:BUGTRAQ
链接:http://www.securityfocus.com/archive/1/485481/100/0/threaded
来源:SECUNIA
链接:http://secunia.com/advisories/29711
来源:SECUNIA
链接:http://secunia.com/advisories/29313
来源:MANDRIVA
链接:http://www.mandriva.com/security/advisories?name=MDVSA-2008:188
来源:BID
链接:http://www.securityfocus.com/bid/27006
来源:FEDORA
链接:https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00460.HTML
来源:VUPEN
链接:http://www.vupen.com/english/advisories/2008/0013
来源:REDHAT
链接:http://www.redhat.com/support/errata/RHSA-2008-0833.HTML
来源:SREASON
链接:http://securityreason.com/securityalert/3485
来源:SECUNIA
链接:http://secunia.com/advisories/32222
来源:SECUNIA
链接:http://secunia.com/advisories/32266
来源:DEBIAN
链接:http://www.debian.org/security/2008/dsa-1447
来源:VUPEN
链接:http://www.vupen.com/english/advisories/2008/1856/references
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.HTML
来源:OSVDB
链接:http://osvdb.org/39833
来源:CONFIRM
链接:http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm
受影响实体
- Apache Tomcat:6.0.8
- Apache Tomcat:6.0.9
- Apache Tomcat:5.5.10
- Apache Tomcat:5.5.11
- Apache Tomcat:5.5.12
补丁
暂无
评论