Lucene search

K
ibmIBMD8364619CBEE24F5374C5900204720B8892538BCBAF940A1D49FD87DDBC8DCB2
HistoryJun 17, 2018 - 10:32 p.m.

Security Bulletin: Vulnerability in Apache Tomcat affects IBM UrbanCode Build (CVE-2014-0227)

2018-06-1722:32:00
www.ibm.com
14

EPSS

0.948

Percentile

99.3%

Summary

Apache Tomcat is vulnerable to HTTP request smuggling. Apache Tomcat is used by IBM UrbanCode Build.

Vulnerability Details

CVE-ID: CVE-2014-0227

Description: Apache Tomcat is vulnerable to HTTP request smuggling. A remote attacker could send a specially-crafted request in a malformed chunked header to the Web server to cause multiple processing conflicts on the servers. An attacker could exploit this vulnerability to poison the web cache, bypass web application firewall protection, and conduct XSS attacks.

**CVSS Base Score:**4.3
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/100751&gt; for the current score *CVSS Environmental Score:**Undefined **CVSS Vector: **(AV:N/AC:M/Au:N/C:N/I:P/A:N)

Affected Products and Versions

IBM UrbanCode Build 6.1.0 and 6.1.0.1 on all supported platforms.

Remediation/Fixes

Upgrade to IBM UrbanCode Build Fix Pack 2 (6.1.0.2) for 6.1.0 as a new version of Apache is now included in the installer.

Workarounds and Mitigations

Note: This mitigation is intended for the servers in “Affected Products and Versions” only. It should not be applied on later releases.

Mitigating HTTP request smuggling through Apache Tomcat

  1. Navigate to &lt;server_install_dir&gt;/opt/tomcat.
  2. Back up server.xml and tomcat.keystore files from the conf directory.
  3. Back up the webapps directory.
  4. Go up a directory to &lt;server_install_dir&gt;/opt and delete the tomcat directory.
  5. Extract Apache Tomcat 6.0.43 or later into &lt;server_install_dir&gt;/opt and rename the directory to tomcat, if needed.
  6. In the new tomcat directory, remove the webapps, logs, and temp directories. Remove the RELEASE-NOTES and RUNNING.txt files as well as they are not needed.
  7. Drop the server.xml and tomcat.keystore files that were backed up earlier into the new conf directory. Overwrite the existing files, if prompted.
  8. Drop the webapps directory that was backed up earlier into the root of the tomcat directory.