Lucene search

K
nessusThis script is Copyright (C) 2019-2023 and is owned by Tenable, Inc. or an Affiliate thereof.TOMCAT_8_5_49.NASL
HistoryDec 27, 2019 - 12:00 a.m.

Apache Tomcat 8.5.0 < 8.5.49 Privilege Escalation

2019-12-2700:00:00
This script is Copyright (C) 2019-2023 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
268

The version of Tomcat installed on the remote host is prior to 8.5.49. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_8.5.49_security-8 advisory.

  • When Apache Tomcat is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files is able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and gain complete control over the Tomcat instance. (CVE-2019-12418)

Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(132413);
  script_version("1.6");
  script_set_attribute(attribute:"plugin_modification_date", value:"2023/10/19");

  script_cve_id("CVE-2019-12418");

  script_name(english:"Apache Tomcat 8.5.0 < 8.5.49 Privilege Escalation");

  script_set_attribute(attribute:"synopsis", value:
"The remote Apache Tomcat server is affected by a vulnerability");
  script_set_attribute(attribute:"description", value:
"The version of Tomcat installed on the remote host is prior to 8.5.49. It is, therefore, affected by a vulnerability as
referenced in the fixed_in_apache_tomcat_8.5.49_security-8 advisory.

  - When Apache Tomcat is configured with the JMX Remote 
    Lifecycle Listener, a local attacker without access to 
    the Tomcat process or configuration files is able to 
    manipulate the RMI registry to perform a man-in-the-middle 
    attack to capture user names and passwords used to access 
    the JMX interface. The attacker can then use these 
    credentials to access the JMX interface and gain complete 
    control over the Tomcat instance. (CVE-2019-12418)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number.");
  script_set_attribute(attribute:"see_also", value:"https://github.com/apache/tomcat/commit/a91d7db");
  # https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.49
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?ed6582f2");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Apache Tomcat version 8.5.49 or later.");
  script_set_attribute(attribute:"agent", value:"all");
  script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-12418");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");

  script_set_attribute(attribute:"vuln_publication_date", value:"2019/12/18");
  script_set_attribute(attribute:"patch_publication_date", value:"2019/11/21");
  script_set_attribute(attribute:"plugin_publication_date", value:"2019/12/27");

  script_set_attribute(attribute:"plugin_type", value:"combined");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:apache:tomcat");
  script_set_attribute(attribute:"thorough_tests", value:"true");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Web Servers");

  script_copyright(english:"This script is Copyright (C) 2019-2023 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("tomcat_error_version.nasl", "tomcat_win_installed.nbin", "apache_tomcat_nix_installed.nbin");
  script_require_keys("installed_sw/Apache Tomcat");

  exit(0);
}

include('tomcat_version.inc');

tomcat_check_version(fixed: '8.5.49', min:'8.5.0', severity:SECURITY_WARNING, granularity_regex: "^8(\.5)?$");
VendorProductVersionCPE
apachetomcatcpe:/a:apache:tomcat