Lucene search

K
ibmIBM2E59BE13E238E4D97B33892C0BB456D62A5C6913F756D4D34620554D57DB715F
HistoryJun 17, 2018 - 5:10 a.m.

Security Bulletin: Vulnerability in Apache Tomcat affects Rational Lifecycle Integration Adapter for HP ALM (CVE-2015-5345, CVE-2016-0706, CVE-2016-0714)

2018-06-1705:10:25
www.ibm.com
9

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

Summary

Apache Tomcat could allow a remote attacker to obtain sensitive information or bypass security restrictions and is supplied with specific versions of Rational Lifecycle Integration Adapter for HP ALM.

Vulnerability Details

CVE Information:

CVE-ID:CVE-2015-5345 Description: Apache Tomcat could allow a remote attacker to obtain sensitive information, caused by an error when accessing a protected directory. By redirecting to the URL, an attacker could exploit this vulnerability to determine the presence of a directory.
CVSS Base Score: 5.300
CVSS Temporal Score: <https://exchange.xforce.ibmcloud.com/vulnerabilities/110857&gt; for more information
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVE-ID:CVE-2016-0706 **Description: *Apache Tomcat could allow a remote attacker to bypass security restrictions, caused by the loading of the StatusManagerServlet during the configuration of a security manager. An attacker could exploit this vulnerability to obtain deployed applications and other sensitive information.
CVSS Base Score: 5.300
CVSS Temporal Score: <https://exchange.xforce.ibmcloud.com/vulnerabilities/110855&gt; for more information
CVSS Environmental Score
: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVE-ID:CVE-2016-0714 **Description: *Apache Tomcat could allow a remote attacker to bypass security restrictions, caused by an error in multiple session persistence mechanisms. By placing a malicious object into a session, an attacker could exploit this vulnerability to bypass a security manager and possibly execute arbitrary code on the system.
CVSS Base Score: 7.300
CVSS Temporal Score: <https://exchange.xforce.ibmcloud.com/vulnerabilities/110856&gt; for more information
CVSS Environmental Score
: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)

Affected Products and Versions

IBM Rational Lifecycle Integration Adapter for HP ALM 1.1.2 and 1.1.2.1

Remediation/Fixes

The IBM Rational Lifecycle Integration Adapter can be updated with a corrected Tomcat by following the instructions below. This is only applicable to products deployed on Apache Tomcat. Be sure to upgrade all the components that your deployment uses.

**Note:**Rational Lifecycle Integration Adapter 1.1.x product modification may contain updated Tomcats, however 1.1.x iFixes typically do not update Tomcat.

NOTE: Apache Tomcat is only included by IBM Rational Lifecycle Integration Adapter version 1.1.2 and 1.1.2.1 Previous versions of the RLIA SE HP Adapter were released as WAR files only.

To obtain the latest Apache Tomcat, please visit the Apache Tomcat website and download versions 6.0.45 or higher version (in 6.0 stream). Once the Tomcat is obtained, follow the instructions below to replace the existing Tomcat:

Upgrading Tomcat installation

1. Stop the Rational Lifecycle Integration Adapter server.

Note: The applications may be running in different application server instances or using a delegated converter.

2. Navigate to the original install directory and rename the Tomcat folder

<InstallDir>/server/tomcat

to

<InstallDir>/server/tomcat-Original

This will ensure that the original Tomcat is kept as a backup in the event a restore is required._

_Example (Linux):
mv <InstallDir>/server/tomcat <InstallDir>/server/tomcat-Original

3. Unzip the new Tomcat file provided by support to the Installation directory.

Example (Linux): unzip <newInsallZip> -d <InstallDir>/server/tomcat/

4. Delete the following directories from the exploded archive:

<InstallDir>/server/tomcat/webapps/docs
<InstallDir>/server/tomcat/webapps/examples
<InstallDir>/server/tomcat/webapps/host-manager
<InstallDir>/server/tomcat/webapps/manager

5. Copy the Apache Tomcat SSL Keystore from the backup:

<InstallDir>/server/tomcat-Original/ibm-team-ssl.keystore

to

<InstallDir>/server/tomcat/ibm-team-ssl.keystore

6. Copy the Apache Tomcat Server configuration from the backup:

<InstallDir>/server/tomcat-Original/conf/server.xml

to

<InstallDir>/server/tomcat/conf/server.xml

7. Copy the HP Adapter WAR file from the backup:

<InstallDir>/server/tomcat-Original/webapps/hpqm.war

to

<InstallDir>/server/tomcat/webapps/hpqm.war

8. Restart the Rational Lifecycle Integration Adapter server

Workarounds and Mitigations

None

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P