SA66 : Multiple Tomcat vulnerabilities in IntelligenceCenter
SUMMARY
IntelligenceCenter uses a version of Tomcat that has several publicly documented vulnerabilities. The most severe vulnerability allows an attacker to mount a denial of service attack or to obtain sensitive information by using a specially crafted header.
AFFECTED PRODUCTS
All versions of IntelligenceCenter prior to version 3.2.2.1 are vulnerable.
Patches
- IntelligenceCenter 3.2 - a fix is available in 3.2.2.1.
- IntelligenceCenter 3.1 and earlier - please upgrade to a later version.
ISSUES
IntelligenceCenter prior to version 3.2.2.1 use Tomcat version 6.0.18. This version of Tomcat has several publicly documented vulnerabilities.
The most severe vulnerability allows an attacker to read data that Tomcat is authorized to access allowing the attacker to view specific configuration data and data sent to and from IntelligenceCenter. The attacker can also mount a denial of service attack using a specially crafted header rendering IntelligenceCenter partially unresponsive for administrative control as well as data transmission.
When IntelligenceCenter is deployed behind a firewall, as is recommended, an attacker must gain access from the internal network in order to mount an attack. The CVSS base scores included in this advisory are based on this deployment scenario.
If IntelligenceCenter is deployed outside of the firewall. the CVSS base score for all CVEs listed would be higher. The CVSS base score for this security advisory would be a 6.4 (AV:N/AC:L/Au:N/C:P/I:N/A:P).
IntelligenceCenter 3.2.2.1 contains an upgrade to Tomcat 6.0.33 fixing the CVEs documented in this security advisory. Other Tomcat vulnerabilities are fixed by this upgrade, but are not listed in this Security Advisory. The Tomcat installation is specifically designed and installed for the exclusive use of IntelligenceCenter. Vulnerabilities not listed in this Security Advisory are not applicable to IntelligenceCenter's use of Tomcat.
MITIGATION
Blue Coat recommends that IntelligenceCenter be deployed behind a firewall. Additional constraints on what IP addresses can be used to connect to IntelligenceCenter will greatly limit the ability to attack an IntelligenceCenter installation.
REFERENCES
CVE-2008-5515 - https://nvd.nist.gov/vuln/detail/CVE-2008-5515
CVE-2009-0783 - https://nvd.nist.gov/vuln/detail/CVE-2009-0783
CVE-2010-1157 - https://nvd.nist.gov/vuln/detail/CVE-2010-1157
CVE-2010-2227 - https://nvd.nist.gov/vuln/detail/CVE-2010-2227
CVE-2010-3718 - https://nvd.nist.gov/vuln/detail/CVE-2010-3718
CVE-2010-4172 - https://nvd.nist.gov/vuln/detail/CVE-2010-4172
CVE-2011-0013 - https://nvd.nist.gov/vuln/detail/CVE-2011-0013
CVE-2011-1184 - https://nvd.nist.gov/vuln/detail/CVE-2011-1184
CVE-2011-2204 - https://nvd.nist.gov/vuln/detail/CVE-2011-2204
CVE-2011-2729 - https://nvd.nist.gov/vuln/detail/CVE-2011-2729
REVISION
2012-01-17 Changed status to final
2012-01-10 Initial public release