Synology-SA-17:54 Tomcat

Publish Time: 2017-09-21 16:37:59 UTC+8

Last Updated: 2017-12-18 15:26:57 UTC+8

Severity
Important
Status
Resolved

Abstract

Multiple security vulnerabilities have been found in Tomcat. These vulnerabilities allow remote attackers to execute arbitrary codes or may result in the leak of sensitive information from a vulnerable version of Tomcat.

Severity

Affected

  • Products
    • Tomcat6 6.0.48-0107 and eariler
    • Tomcat7 7.0.73-0110 and eariler
  • Models
    • All Synology models

Description

  • CVE-2017-12615
    When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.
  • CVE-2017-12616
    When using a VirtualDirContext with Apache Tomcat 7.0.0 to 7.0.80 it was possible to bypass security constraints and/or view the source code of JSPs for resources served by the VirtualDirContext using a specially crafted request.

Mitigation

None

Update Availability

To fix the security issue, please update Tomcat7 to 7.0.82-0113 or above.

Tomcat6 has reached its end of life. We will no longer maintain this package.

Reference