QID 730995

Date Published: 2023-12-06

QID 730995: Apache Tomcat Local Privilege Escalation Vulnerability (Unauthenticated Check)

Apache Tomcat is an open source web server and servlet container developed by the Apache Software Foundation.

When Apache Tomcat is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files is able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface.

Affected Versions:
Apache Tomcat 9.0.0.M1 to 9.0.28
Apache Tomcat 8.5.0 to 8.5.47
Apache Tomcat 7.0.0 and 7.0.97
QID Detection: (Authenticated) - Windows
This QID checks for registry key - "KLM\Software\Apache Software Foundation\Tomcat.5\Tomcat8" and value "Version" and then checks the version. QID Detection Logic (Unauthenticated):
The QID checks for vulnerable versions by sending a GET /QUALYS91642 HTTP/1.0 request which helps in retrieving the installed version of Apache Tomcat in the banner of the response.

The attacker can then use these credentials to access the JMX interface and gain complete control over the Tomcat instance.

  • CVSS V3 rated as High - 7 severity.
  • CVSS V2 rated as Medium - 4.4 severity.
  • Solution
    Upgrade to the Apache Tomcat 7.0.99,8.5.49, 9.0.0.29 or to the latest version of Apache Tomcat. Please refer to Apache Tomcat Website.Workaround:
    Disable Tomcat's JmxRemoteLifecycleListener and use the built-in remote JMX facilities provided by the JVM

    CVEs related to QID 730995

    Software Advisories
    Advisory ID Software Component Link
    Apache Tomcat URL Logo tomcat.apache.org/