CVE-2015-5351

Published: 24 February 2016

The (1) Manager and (2) Host Manager applications in Apache Tomcat 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 establish sessions and send CSRF tokens for arbitrary new requests, which allows remote attackers to bypass a CSRF protection mechanism by using a token.

From the Ubuntu security team

It was discovered that the Tomcat Manager and Host Manager applications incorrectly handled new requests. A remote attacker could possibly use this issue to bypass CSRF protection mechanisms.

Priority

Medium

CVSS 3 base score: 8.8

Status

Package Release Status
tomcat6
Launchpad, Ubuntu, Debian
Upstream
Released (6.0.45)
Ubuntu 18.04 LTS (Bionic Beaver) Does not exist

Ubuntu 16.04 LTS (Xenial Xerus) Not vulnerable
(6.0.45+dfsg-1)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (6.0.39-1ubuntu0.1)
Patches:
Upstream: http://svn.apache.org/viewvc?view=revision&revision=1720661
Upstream: http://svn.apache.org/viewvc?view=revision&revision=1720655
tomcat7
Launchpad, Ubuntu, Debian
Upstream
Released (7.0.68-1)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(7.0.68-1)
Ubuntu 16.04 LTS (Xenial Xerus) Not vulnerable
(7.0.68-1)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (7.0.52-1ubuntu0.6)
Patches:
Upstream: http://svn.apache.org/viewvc?view=revision&revision=1720661
Upstream: http://svn.apache.org/viewvc?view=revision&revision=1720663
tomcat8
Launchpad, Ubuntu, Debian
Upstream
Released (8.0.32-1)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(8.0.32-1ubuntu1)
Ubuntu 16.04 LTS (Xenial Xerus) Not vulnerable
(8.0.32-1ubuntu1)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

Patches:
Upstream: http://svn.apache.org/viewvc?view=revision&revision=1720658
Upstream: http://svn.apache.org/viewvc?view=revision&revision=1720660