Lucene search

K
ibmIBMEE00AFDB598E841865864D902BD9942216CADE92DA6021EB70C2754E09791D6D
HistoryJun 17, 2018 - 2:40 p.m.

Security Bulletin: TADDM - Security improvement: Tomcat default files and non-encrypted administrative interfaces available.

2018-06-1714:40:57
www.ibm.com
7

EPSS

0.002

Percentile

61.2%

Summary

TADDM security improvement deployed starting from TADDM 7.2.1.5 and in TADDM 7.2.2 related to availability of the default Tomcat administration interface.

Vulnerability Details

CVE-2013-3023
Description
TADDM server prompts for credentials to access Tomcat Manager Application and Tomcat Host Manager Application, after applying address to this application. It is not possible to log-on there without configuration changes in Tomcat, but user can provide valid credentials via HTTP that can be sniffed by a malicious user.

CVSS Base Score: 4.3
CVSS Temporal Score: <https://exchange.xforce.ibmcloud.com/vulnerabilities/84361&gt;
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)

Affected Products and Versions

TADDM 7.1.2, 7.2.0.0 through 7.2.1.4 (fix included in TADDM 7.2.1.5 and TADDM 7.2.2.0)

Remediation/Fixes

Upgrade to TADDM 7.2.1.5 or TADDM 7.2.2.0
If you are unable to upgrade apply workaround, or please contact IBM Support.

Workarounds and Mitigations

Please delete the following files from the TADDM server installation:
$COLLATION_HOME/dist/external/apache-tomcat-x.x.xx/conf/Catalina/localhost/manager.xml
$COLLATION_HOME/dist/external/apache-tomcat-x.x.xx/conf/Catalina/localhost/host-manager.xml

After restart TADDM, below pages should not prompt for credentials:
http://<taddm_ip>:9430/manager/html
http://<taddm_ip>:9430/host-manager/html

EPSS

0.002

Percentile

61.2%

Related for EE00AFDB598E841865864D902BD9942216CADE92DA6021EB70C2754E09791D6D