QID 352256

Date Published: 2021-04-06

QID 352256: Amazon Linux Security Advisory for tomcat8: ALAS-2021-1491

<DIV> Issue Overview:

A deserialization flaw was discovered in Apache Tomcat's use of a FileStore. Under specific circumstances, an attacker can use a specially crafted request to trigger Remote Code Execution through deserialization of the file under their control. The highest threat from the vulnerability is to data confidentiality and integrity as well as system availability. (CVE-2020-9484 )

When responding to new h2c connection requests, Apache Tomcat versions 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41 and 8.5.0 to 8.5.61 could duplicate request headers and a limited amount of request body from one request to another meaning user A and user B could both see the results of user A's request. (CVE-2021-25122 )

</DIV>

Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as Medium - 5 severity.
  • Solution
    Please refer to Amazon advisory ALAS-2021-1491 for affected packages and patching details, or update with your package manager.
    Vendor References

    CVEs related to QID 352256

    Software Advisories
    Advisory ID Software Component Link
    ALAS-2021-1491 Amazon Linux tomcat8 (8.5.63-1.87.amzn1) on noarch URL Logo alas.aws.amazon.com/ALAS-2021-1491.html
    ALAS-2021-1491 Amazon Linux tomcat8 (8.5.63-1.87.amzn1) on src URL Logo alas.aws.amazon.com/ALAS-2021-1491.html