VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : 脆弱性脅威分析用情報の定型データ配信
[ about VRDA Feed | JPCERT/CC



 
分析対象脆弱性情報 (リビジョン番号 : 1) [ Download XML
CVE-2012-3546
tomcat: org/apache/catalina/realm/RealmBase.java in Apache ...
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3546

原文

org/apache/catalina/realm/RealmBase.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.30, when FORM authentication is used, allows remote attackers to bypass security-constraint checks by leveraging a previous setUserPrincipal call and then placing /j_security_check at the end of a URI.

翻訳   (表示)





この情報について
分析情報提供元:
NIST NVD
初版公開日:
2012-12-19
分析対象脆弱性情報の分類:
アドバイザリ・注意喚起
最終更新日:
2012-12-19




脆弱性の影響を受ける製品の識別子
cpe:/a:apache:tomcat:6.0
cpe:/a:apache:tomcat:6.0.0
cpe:/a:apache:tomcat:6.0.0:alpha
cpe:/a:apache:tomcat:6.0.1
cpe:/a:apache:tomcat:6.0.10
cpe:/a:apache:tomcat:6.0.11
cpe:/a:apache:tomcat:6.0.12
cpe:/a:apache:tomcat:6.0.13
cpe:/a:apache:tomcat:6.0.14
cpe:/a:apache:tomcat:6.0.15
cpe:/a:apache:tomcat:6.0.16
cpe:/a:apache:tomcat:6.0.17
cpe:/a:apache:tomcat:6.0.18
cpe:/a:apache:tomcat:6.0.19
cpe:/a:apache:tomcat:6.0.1:alpha
cpe:/a:apache:tomcat:6.0.2
cpe:/a:apache:tomcat:6.0.20
cpe:/a:apache:tomcat:6.0.24
cpe:/a:apache:tomcat:6.0.26
cpe:/a:apache:tomcat:6.0.27
cpe:/a:apache:tomcat:6.0.28
cpe:/a:apache:tomcat:6.0.29
cpe:/a:apache:tomcat:6.0.2:alpha
cpe:/a:apache:tomcat:6.0.2:beta
cpe:/a:apache:tomcat:6.0.3
cpe:/a:apache:tomcat:6.0.30
cpe:/a:apache:tomcat:6.0.31
cpe:/a:apache:tomcat:6.0.32
cpe:/a:apache:tomcat:6.0.33
cpe:/a:apache:tomcat:6.0.35
cpe:/a:apache:tomcat:6.0.4
cpe:/a:apache:tomcat:6.0.5
cpe:/a:apache:tomcat:6.0.6
cpe:/a:apache:tomcat:6.0.7
cpe:/a:apache:tomcat:6.0.8
cpe:/a:apache:tomcat:6.0.9
cpe:/a:apache:tomcat:6.0.9:beta
cpe:/a:apache:tomcat:7.0.0
cpe:/a:apache:tomcat:7.0.0:beta
cpe:/a:apache:tomcat:7.0.1
cpe:/a:apache:tomcat:7.0.10
cpe:/a:apache:tomcat:7.0.11
cpe:/a:apache:tomcat:7.0.12
cpe:/a:apache:tomcat:7.0.13
cpe:/a:apache:tomcat:7.0.14
cpe:/a:apache:tomcat:7.0.15
cpe:/a:apache:tomcat:7.0.16
cpe:/a:apache:tomcat:7.0.17
cpe:/a:apache:tomcat:7.0.18
cpe:/a:apache:tomcat:7.0.19
cpe:/a:apache:tomcat:7.0.2
cpe:/a:apache:tomcat:7.0.20
cpe:/a:apache:tomcat:7.0.21
cpe:/a:apache:tomcat:7.0.22
cpe:/a:apache:tomcat:7.0.23
cpe:/a:apache:tomcat:7.0.25
cpe:/a:apache:tomcat:7.0.28
cpe:/a:apache:tomcat:7.0.2:beta
cpe:/a:apache:tomcat:7.0.3
cpe:/a:apache:tomcat:7.0.4
cpe:/a:apache:tomcat:7.0.4:beta
cpe:/a:apache:tomcat:7.0.5
cpe:/a:apache:tomcat:7.0.6
cpe:/a:apache:tomcat:7.0.7
cpe:/a:apache:tomcat:7.0.8
cpe:/a:apache:tomcat:7.0.9
 


脆弱性の分析内容
[攻撃元区分]  [?]
未評価 [?]

ローカル [?]
隣接 [?]
X ネットワーク [?]

[攻撃条件の複雑さ]  [?]
未評価 [?]

 [?]
X [?]
 [?]

[攻撃前の認証要否]  [?]
未評価 [?]

複数 [?]
単一 [?]
X 不要 [?]

[機密性への影響]  [?]
未評価 [?]

X 影響なし [?]
部分的 [?]
全面的 [?]

[完全性への影響]  [?]
未評価 [?]

影響なし [?]
X 部分的 [?]
全面的 [?]

[可用性への影響]  [?]
未評価 [?]

X 影響なし [?]
部分的 [?]
全面的 [?]

関連情報




参考情報
BUGTRAQ 20121204 CVE-2012-3546 Apache Tomcat Bypass of security constraints




CONFIRM http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/webapps/docs/changelog.xml?r1=1377892&r2=1377891&pathrev=1377892




CONFIRM http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/java/org/apache/catalina/realm/RealmBase.java?r1=1377892&r2=1377891&pathrev=1377892




CONFIRM http://tomcat.apache.org/security-7.html




CONFIRM http://tomcat.apache.org/security-6.html




CONFIRM http://svn.apache.org/viewvc?view=revision&revision=1377892




Vulnerability Type Permissions, Privileges, and Access Control (CWE-264)





Copyright © 2012 JPCERT/CC All Rights Reserved.