{"id":2110,"date":"2020-05-26T22:25:44","date_gmt":"2020-05-27T03:25:44","guid":{"rendered":"https:\/\/cert.pa\/?p=2110"},"modified":"2020-05-26T22:25:55","modified_gmt":"2020-05-27T03:25:55","slug":"csirt-panama-aviso-2020-05-26-apache-tomcat-actualizaciones-de-multiples-vulnerabilidades-que-afectan-apache-para-apache-tomcat","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=2110","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2020-05-26 Apache Tomcat: Actualizaciones de M\u00faltiples vulnerabilidades que afectan Apache para Apache Tomcat."},"content":{"rendered":"\n<p>Gravedad:Media\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Vulnerabilidad: CVE-20209484\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Fecha de publicaci\u00f3n: Mayo 26, 2020<br> \u00daltima revisi\u00f3n: Mayo 26, 2020<br> Portal: https:\/\/apache.org<\/p>\n\n\n\n<p><strong>Sistemas Afectados:<\/strong><br>\nVulnerabilidades de seguridad que afectan a todas las versiones anteriores de: <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Apache Tomcat desde la versi\u00f3n\n10.0.0-M1 hasta la 10.0.0-M4.<\/li><li>Apache Tomcat desde la versi\u00f3n 9.0.0.M1\nhasta la 9.0.34.<\/li><li>Apache Tomcat desde la versi\u00f3n 8.5.0\nhasta la 8.5.54.<\/li><li>Apache Tomcat desde la versi\u00f3n 7.0.0\nhasta la 7.0.103<\/li><\/ul>\n\n\n\n<p><strong>I. Descripci\u00f3n<\/strong><br>\nActualizaci\u00f3n de seguridad que afecta Apache para Apache Tomcat<\/p>\n\n\n\n<p><strong>II. Impacto<\/strong><\/p>\n\n\n\n<p>Vulnerabilidad: CVE-2020-9484<\/p>\n\n\n\n<p>Enviando una petici\u00f3n\nespecialmente dise\u00f1ada al servidor Apache Tomcat, un atacante podr\u00eda enviar la\nejecuci\u00f3n de c\u00f3digo remoto a trav\u00e9s de la codificaci\u00f3n de un archivo bajo su\ncontrol, comprometiendo completamente. Algunas condiciones determinantes para\nrealizar el ataque son:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>El atacante debe poder\ncontrolar los contenidos y el nombre de un archivo en el servidor.<\/li><li>El servidor debe estar\nconfigurado para utilizar \u00abPersistenceManager\u00bb con un \u00abFileStore\u00bb.<\/li><li>El par\u00e1metro\n\u00absessionAttributeValueClassNameFilter\u00bb en \u00abPersistenceManager\u00bb est\u00e1 configurado\ncon el valor \u00abnull\u00bb (el cual viene por defecto a menos de que se utilice\n\u00abSecurityManager\u00bb), o con un filtro suficientemente flexible como para permitir\nla codificaci\u00f3n del objeto proporcionado por el atacante.<\/li><li>El atacante debe conocer\nla ruta relativa desde la zona de almacenamiento utilizada por \u00abFileStore\u00bb\nhasta el archivo bajo su control.nte al sistema afectado.<\/li><\/ul>\n\n\n\n<p><strong>III. Referencia a soluciones, herramientas e\ninformaci\u00f3n<\/strong><strong><\/strong><\/p>\n\n\n\n<p>Actualizar a las versiones correspondientes de Apache\nTomcat 7.0.104, 8.5.55, 9.0.35, 10.0.0-M5 o posterior, mediante su sitio web (<a href=\"https:\/\/projects.apache.org\/releases.html\">https:\/\/projects.apache.org\/releases.html<\/a>)<\/p>\n\n\n\n<p><strong>Fuentes:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Apache Tomcat Remote Code Execution via session\npersistence. 20 de mayo del 20202. apache.org. Recopilado en:&nbsp;<a href=\"https:\/\/lists.apache.org\/thread.html\/r77eae567ed829da9012cadb29af17f2df8fa23bf66faf88229857bb1%40%3cannounce.tomcat.apache.org\">https:\/\/lists.apache.org\/thread.html\/r77eae567ed829da9012cadb29af17f2df8fa23bf66faf88229857bb1%40&lt;announce.tomcat.apache.org<\/a><\/li><li>Common Vulnerabilities and Exposures (CVE).\nRecopilado en: <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-9484\">https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-9484<\/a><\/li><li>CSIRT Chile. 24 de mayo del 2020. Vulnerabilidades.\nRecopilado en: https:\/\/www.csirt.gob.cl\/vulnerabilidades\/9vsa20-00222-01\/<\/li><\/ul>\n\n\n\n<p><strong>Informaci\u00f3n de contacto<\/strong><br>\nCSIRT PANAMA<br>\nComputer Security Incident Response Team Autoridad Nacional para la Innovacion\nGubernamental<br>\nE-Mail: info@cert.pa<br>\nPhone: +507 520-CERT (2378)<br>\nWeb: https:\/\/cert.pa<br>\nTwitter: @CSIRTPanama<br>\nKey ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Gravedad:Media\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Vulnerabilidad: CVE-20209484\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Fecha de publicaci\u00f3n: Mayo 26, 2020 \u00daltima revisi\u00f3n: Mayo 26, 2020 Portal: https:\/\/apache.org Sistemas Afectados: Vulnerabilidades de seguridad que afectan a todas las versiones anteriores de: Apache Tomcat desde la versi\u00f3n 10.0.0-M1&#8230;<\/p>\n","protected":false},"author":4,"featured_media":1428,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[],"class_list":["post-2110","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2110","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2110"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2110\/revisions"}],"predecessor-version":[{"id":2111,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2110\/revisions\/2111"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/1428"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2110"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2110"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2110"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}