The Virsec Security Research Lab provides a detailed analysis of recent and notable security vulnerabilities.
A new remote code execution vulnerability was disclosed for Apache Tomcat. Affected versions are:
There are several prerequisites for this vulnerability to be exploitable.
Watch the video to learn more about this and other important vulnerabilities.
The CVSS Base Score is 7.0 (High)
The vulnerability exists because the PersistentManager will try to load session objects from disk. These session objects are stored as serialized object. The idea is to have the attacker store a malicious serialized object on disk and have the PersistentManager load from there.
This attack can have a high impact (RCE), but the conditions that need to be met make the likelihood of exploitation low.
A publicly disclosed exploit code is available here. Based on this link from 2010, Apache Tomcat has been downloaded 10 Million times. Tomcat has 60% market share of Java Application servers. Given that Apache Tomcat powers a broad range of web applications across countless industries and use cases, from Fortune 500 conglomerates to service providers to eCommerce systems, it is reasonable to estimate that 10s of millions of this software are in use.
Based on the link here, large range of versions of tomcat are affected. This site also has a hacking tutorial that helps exploiting Java deserialization vulnerabilities. Given the severity of the vulnerability and with exploit available publicly, all the Apache Tomcat servers are at high risk.
The Virsec Security Platform (VSP) monitors processes that are spawned that are not part of a set of allowlisted processes. Any attempt to execute a new command or unknown binary would be denied by VSP's Process Monitoring capability. VSP's FSM capability would also detect the attempt to place a web shell on a disk.
Download the full vulnerability report to learn more about this and other important vulnerabilities.
Jump to: List of CVE Vulnerabilities