When using FORM authentication with Apache Tomcat 9.0.0.M1 to 9.0.29, 8.5.0
to 8.5.49 and 7.0.0 to 7.0.98 there was a narrow window where an attacker
could perform a session fixation attack. The window was considered too
narrow for an exploit to be practical but, erring on the side of caution,
this issue has been treated as a security vulnerability.
When Apache Tomcat 9.0.0.M1 to 9.0.28, 8.5.0 to 8.5.47, 7.0.0 and 7.0.97 is
configured with the JMX Remote Lifecycle Listener, a local attacker without
access to the Tomcat process or configuration files is able to manipulate
the RMI registry to perform a man-in-the-middle attack to capture user names
and passwords used to access the JMX interface. The attacker can then use
these credentials to access the JMX interface and gain complete control over
the Tomcat instance.
@maintainer(s), ok to cleanup?
$ equery meta tomcat
* www-servers/tomcat [gentoo]
Maintainer: email@example.com (Java)
Upstream: None specified
Keywords: 7.0.100:7: amd64 ~amd64-linux ~ppc64 ~x86 ~x86-linux ~x86-solaris
Keywords: 8.5.51:8.5: amd64
Keywords: 8.5.53:8.5: ~amd64 ~amd64-linux ~x86 ~x86-linux ~x86-solaris
Keywords: 9.0.33:9: ~amd64 ~amd64-linux ~x86 ~x86-linux ~x86-solaris
the tree is clean
Added to an existing GLSA.
This issue was resolved and addressed in
GLSA 202003-43 at https://security.gentoo.org/glsa/202003-43
by GLSA coordinator Thomas Deutschmann (whissi).