Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2017-5664

Published: 6 June 2017

The error page mechanism of the Java Servlet Specification requires that, when an error occurs and an error page is configured for the error that occurred, the original request and response are forwarded to the error page. This means that the request is presented to the error page with the original HTTP method. If the error page is a static file, expected behaviour is to serve content of the file as if processing a GET request, regardless of the actual HTTP method. The Default Servlet in Apache Tomcat 9.0.0.M1 to 9.0.0.M20, 8.5.0 to 8.5.14, 8.0.0.RC1 to 8.0.43 and 7.0.0 to 7.0.77 did not do this. Depending on the original request this could lead to unexpected and undesirable results for static error pages including, if the DefaultServlet is configured to permit writes, the replacement or removal of the custom error page. Notes for other user provided error pages: (1) Unless explicitly coded otherwise, JSPs ignore the HTTP method. JSPs used as error pages must must ensure that they handle any error dispatch as a GET request, regardless of the actual method. (2) By default, the response generated by a Servlet does depend on the HTTP method. Custom Servlets used as error pages must ensure that they handle any error dispatch as a GET request, regardless of the actual method.

Priority

Medium

Cvss 3 Severity Score

7.5

Score breakdown

Status

Package Release Status
tomcat6
Launchpad, Ubuntu, Debian
artful Does not exist

bionic Does not exist

cosmic Does not exist

disco Does not exist

eoan Does not exist

focal Does not exist

xenial Not vulnerable
(6.0.45+dfsg-1)
impish Does not exist

jammy Does not exist

kinetic Does not exist

lunar Does not exist

groovy Does not exist

hirsute Does not exist

trusty Needed

upstream
Released (6.0.41-3)
yakkety Does not exist

zesty Does not exist

mantic Does not exist

tomcat7
Launchpad, Ubuntu, Debian
impish Does not exist

xenial Needed

jammy Does not exist

kinetic Does not exist

lunar Does not exist

artful Not vulnerable
(7.0.78-1)
bionic Not vulnerable
(7.0.78-1)
cosmic Not vulnerable
(7.0.78-1)
disco Does not exist

eoan Does not exist

focal Does not exist

groovy Does not exist

hirsute Does not exist

trusty
Released (7.0.52-1ubuntu0.13)
upstream
Released (7.0.78)
yakkety Ignored
(end of life)
zesty Ignored
(end of life)
mantic Does not exist

Patches:
upstream: https://svn.apache.org/viewvc?view=revision&revision=1793471
upstream: https://svn.apache.org/viewvc?view=revision&revision=1793491


tomcat8
Launchpad, Ubuntu, Debian
impish Does not exist

jammy Does not exist

kinetic Does not exist

lunar Does not exist

disco Does not exist

eoan Does not exist

focal Does not exist

artful Not vulnerable
(8.5.21-1)
bionic Not vulnerable
(8.5.21-1)
cosmic Not vulnerable
(8.5.21-1)
groovy Does not exist

hirsute Does not exist

trusty Does not exist

upstream
Released (8.5.15)
xenial
Released (8.0.32-1ubuntu1.5)
yakkety Ignored
(end of life)
zesty
Released (8.0.38-2ubuntu2.2)
mantic Does not exist

Patches:


upstream: https://svn.apache.org/viewvc?view=revision&revision=1793470
upstream: https://svn.apache.org/viewvc?view=revision&revision=1793489

Severity score breakdown

Parameter Value
Base score 7.5
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact High
Availability impact None
Vector CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N