Vulnerabilities > CVE-2013-2067 - Improper Authentication vulnerability in Apache Tomcat

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

java/org/apache/catalina/authenticator/FormAuthenticator.java in the form authentication feature in Apache Tomcat 6.0.21 through 6.0.36 and 7.x before 7.0.33 does not properly handle the relationships between authentication requirements and sessions, which allows remote attackers to inject a request into a session by sending this request during completion of the login form, a variant of a session fixation attack.

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Authentication Abuse
    An attacker obtains unauthorized access to an application, service or device either through knowledge of the inherent weaknesses of an authentication mechanism, or by exploiting a flaw in the authentication scheme's implementation. In such an attack an authentication mechanism is functioning but a carefully controlled sequence of events causes the mechanism to grant access to the attacker. This attack may exploit assumptions made by the target's authentication procedures, such as assumptions regarding trust relationships or assumptions regarding the generation of secret values. This attack differs from Authentication Bypass attacks in that Authentication Abuse allows the attacker to be certified as a valid user through illegitimate means, while Authentication Bypass allows the user to access protected material without ever being certified as an authenticated user. This attack does not rely on prior sessions established by successfully authenticating users, as relied upon for the "Exploitation of Session Variables, Resource IDs and other Trusted Credentials" attack patterns.
  • Exploiting Trust in Client (aka Make the Client Invisible)
    An attack of this type exploits a programs' vulnerabilities in client/server communication channel authentication and data integrity. It leverages the implicit trust a server places in the client, or more importantly, that which the server believes is the client. An attacker executes this type of attack by placing themselves in the communication channel between client and server such that communication directly to the server is possible where the server believes it is communicating only with a valid client. There are numerous variations of this type of attack.
  • Utilizing REST's Trust in the System Resource to Register Man in the Middle
    This attack utilizes a REST(REpresentational State Transfer)-style applications' trust in the system resources and environment to place man in the middle once SSL is terminated. Rest applications premise is that they leverage existing infrastructure to deliver web services functionality. An example of this is a Rest application that uses HTTP Get methods and receives a HTTP response with an XML document. These Rest style web services are deployed on existing infrastructure such as Apache and IIS web servers with no SOAP stack required. Unfortunately from a security standpoint, there frequently is no interoperable identity security mechanism deployed, so Rest developers often fall back to SSL to deliver security. In large data centers, SSL is typically terminated at the edge of the network - at the firewall, load balancer, or router. Once the SSL is terminated the HTTP request is in the clear (unless developers have hashed or encrypted the values, but this is rare). The attacker can utilize a sniffer such as Wireshark to snapshot the credentials, such as username and password that are passed in the clear once SSL is terminated. Once the attacker gathers these credentials, they can submit requests to the web service provider just as authorized user do. There is not typically an authentication on the client side, beyond what is passed in the request itself so once this is compromised, then this is generally sufficient to compromise the service's authentication scheme.
  • Man in the Middle Attack
    This type of attack targets the communication between two components (typically client and server). The attacker places himself in the communication channel between the two components. Whenever one component attempts to communicate with the other (data flow, authentication challenges, etc.), the data first goes to the attacker, who has the opportunity to observe or alter it, and it is then passed on to the other component as if it was never intercepted. This interposition is transparent leaving the two compromised components unaware of the potential corruption or leakage of their communications. The potential for Man-in-the-Middle attacks yields an implicit lack of trust in communication or identify between two components.

Nessus

  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201412-29.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201412-29 (Apache Tomcat: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Tomcat. Please review the CVE identifiers referenced below for details. Impact : A remote attacker may be able to cause a Denial of Service condition as well as obtain sensitive information, bypass protection mechanisms and authentication restrictions. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id79982
    published2014-12-15
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/79982
    titleGLSA-201412-29 : Apache Tomcat: Multiple vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Gentoo Linux Security Advisory GLSA 201412-29.
    #
    # The advisory text is Copyright (C) 2001-2019 Gentoo Foundation, Inc.
    # and licensed under the Creative Commons - Attribution / Share Alike 
    # license. See http://creativecommons.org/licenses/by-sa/3.0/
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(79982);
      script_version("1.10");
      script_cvs_date("Date: 2019/10/16 10:34:21");
    
      script_cve_id("CVE-2012-2733", "CVE-2012-3544", "CVE-2012-3546", "CVE-2012-4431", "CVE-2012-4534", "CVE-2012-5885", "CVE-2012-5886", "CVE-2012-5887", "CVE-2013-2067", "CVE-2013-2071", "CVE-2013-4286", "CVE-2013-4322", "CVE-2013-4590", "CVE-2014-0033", "CVE-2014-0050", "CVE-2014-0075", "CVE-2014-0096", "CVE-2014-0099", "CVE-2014-0119");
      script_bugtraq_id(56402, 56403, 56812, 56813, 56814, 59797, 59798, 59799, 65400, 65767, 65768, 65769, 65773, 67667, 67668, 67669, 67671);
      script_xref(name:"GLSA", value:"201412-29");
    
      script_name(english:"GLSA-201412-29 : Apache Tomcat: Multiple vulnerabilities");
      script_summary(english:"Checks for updated package(s) in /var/db/pkg");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Gentoo host is missing one or more security-related
    patches."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "The remote host is affected by the vulnerability described in GLSA-201412-29
    (Apache Tomcat: Multiple vulnerabilities)
    
        Multiple vulnerabilities have been discovered in Tomcat. Please review
          the CVE identifiers referenced below for details.
      
    Impact :
    
        A remote attacker may be able to cause a Denial of Service condition as
          well as obtain sensitive information, bypass protection mechanisms and
          authentication restrictions.
      
    Workaround :
    
        There is no known workaround at this time."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security.gentoo.org/glsa/201412-29"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "All Tomcat 6.0.x users should upgrade to the latest version:
          # emerge --sync
          # emerge --ask --oneshot --verbose '>=www-servers/tomcat-6.0.41'
        All Tomcat 7.0.x users should upgrade to the latest version:
          # emerge --sync
          # emerge --ask --oneshot --verbose '>=www-servers/tomcat-7.0.56'"
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploited_by_malware", value:"true");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:tomcat");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2012/11/16");
      script_set_attribute(attribute:"patch_publication_date", value:"2014/12/15");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/12/15");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Gentoo Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("qpkg.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo");
    if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    
    if (qpkg_check(package:"www-servers/tomcat", unaffected:make_list("ge 7.0.56", "rge 6.0.41", "rge 6.0.42", "rge 6.0.43", "rge 6.0.44", "rge 6.0.45", "rge 6.0.46", "rge 6.0.47", "rge 6.0.48"), vulnerable:make_list("lt 7.0.56"))) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = qpkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "Apache Tomcat");
    }
    
  • NASL familyWeb Servers
    NASL idTOMCAT_7_0_33.NASL
    descriptionAccording to its self-reported version number, the instance of Apache Tomcat 7.0 listening on the remote host is prior to 7.0.33. It is, therefore, affected by an error related to HTML form authentication and session fixation that allows an attacker to carry out requests using a victim
    last seen2020-03-18
    modified2013-05-15
    plugin id66427
    published2013-05-15
    reporterThis script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/66427
    titleApache Tomcat 7.0.x < 7.0.33 Session Fixation
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(66427);
      script_version("1.16");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/03/11");
    
      script_cve_id("CVE-2013-2067");
      script_bugtraq_id(59799);
    
      script_name(english:"Apache Tomcat 7.0.x < 7.0.33 Session Fixation");
      script_summary(english:"Checks the Apache Tomcat version.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote Apache Tomcat server is affected by a security bypass
    vulnerability.");
      script_set_attribute(attribute:"description", value:
    "According to its self-reported version number, the instance of Apache
    Tomcat 7.0 listening on the remote host is prior to 7.0.33. It is,
    therefore, affected by an error related to HTML form authentication
    and session fixation that allows an attacker to carry out requests
    using a victim's credentials.
    
    Note that Nessus has not tested for this issue but has instead relied
    only on the application's self-reported version number.");
      script_set_attribute(attribute:"see_also", value:"http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.33");
      script_set_attribute(attribute:"solution", value:"Update to Apache Tomcat version 7.0.33 or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2013-2067");
    
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2013/05/10");
      script_set_attribute(attribute:"patch_publication_date", value:"2012/11/21");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/05/15");
    
      script_set_attribute(attribute:"plugin_type", value:"combined");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:apache:tomcat");
      script_set_attribute(attribute:"agent", value:"all");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Web Servers");
    
      script_copyright(english:"This script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("tomcat_error_version.nasl", "tomcat_win_installed.nbin", "apache_tomcat_nix_installed.nbin");
      script_require_keys("installed_sw/Apache Tomcat");
    
      exit(0);
    }
    
    include("tomcat_version.inc");
    
    tomcat_check_version(fixed:"7.0.33", min:"7.0.0", severity:SECURITY_WARNING, granularity_regex:"^7(\.0)?$");
    
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2013-0833.NASL
    descriptionThe version of JBoss Enterprise Application Platform 6.0.1 running on the remote system is vulnerable to the following issues: - A man-in-the-middle attack is possible when applications running on JBoss Web use the COOKIE session tracking method. The flaw is in the org.apache.catalina.connector.Response.encodeURL() method. By making use of this, an attacker could obtain a user
    last seen2020-06-01
    modified2020-06-02
    plugin id66971
    published2013-06-24
    reporterThis script is Copyright (C) 2013-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/66971
    titleJBoss Enterprise Application Platform 6.1.0 Update (RHSA-2013:0833)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(66971);
      script_version("1.16");
      script_cvs_date("Date: 2019/10/24 15:35:37");
    
      script_cve_id(
        "CVE-2012-4529",
        "CVE-2012-4572",
        "CVE-2012-5575",
        "CVE-2013-0166",
        "CVE-2013-0169",
        "CVE-2013-0218",
        "CVE-2013-2067"
      );
      script_bugtraq_id(57652, 57778, 59799, 60040, 60043, 60045, 60268);
      script_xref(name:"RHSA", value:"2013:0833");
    
      script_name(english:"JBoss Enterprise Application Platform 6.1.0 Update (RHSA-2013:0833)");
      script_summary(english:"Checks for the installed versions of JBoss Enterprise Application Platform");
    
      script_set_attribute(attribute:"synopsis", value:"The remote Red Hat host is missing a security update.");
      script_set_attribute(attribute:"description", value:
    "The version of JBoss Enterprise Application Platform 6.0.1 running on
    the remote system is vulnerable to the following issues:
    
      - A man-in-the-middle attack is possible when applications
        running on JBoss Web use the COOKIE session tracking
        method. The flaw is in the
        org.apache.catalina.connector.Response.encodeURL()
        method. By making use of this, an attacker could obtain
        a user's jsessionid and hijack their session.
        (CVE-2012-4529)
    
      - If multiple applications used the same custom
        authorization module class name, a local attacker could
        deploy a malicious application authorization module that
        would permit or deny user access. (CVE-2012-4572)
    
      - XML encryption backwards compatibility attacks could
        allow an attacker to force a server to use insecure
        legacy cryptosystems. (CVE-2012-5575)
    
      - A NULL pointer dereference flaw could allow a malicious
        OCSP to crash applications performing OCSP verification.
        (CVE-2013-0166)
    
      - An OpenSSL leaks timing information issue exists that
        could allow a remote attacker to retrieve plaintext
        from the encrypted packets. (CVE-2013-0169)
    
      - The JBoss Enterprise Application Platform administrator
        password and the sucker password are stored in a world-
        readable, auto-install XML file created by the GUI
        installer. (CVE-2013-0218)
    
      - Tomcat incorrectly handles certain authentication
        requests. A remote attacker could use this flaw to
        inject a request that would get executed with a victim's
        credentials. (CVE-2013-2067)");
      script_set_attribute(attribute:"see_also", value:"https://www.redhat.com/security/data/cve/CVE-2012-4529.html");
      script_set_attribute(attribute:"see_also", value:"https://www.redhat.com/security/data/cve/CVE-2012-4572.html");
      script_set_attribute(attribute:"see_also", value:"https://www.redhat.com/security/data/cve/CVE-2012-5575.html");
      script_set_attribute(attribute:"see_also", value:"https://www.redhat.com/security/data/cve/CVE-2013-0166.html");
      script_set_attribute(attribute:"see_also", value:"https://www.redhat.com/security/data/cve/CVE-2013-0169.html");
      script_set_attribute(attribute:"see_also", value:"https://www.redhat.com/security/data/cve/CVE-2013-0218.html");
      script_set_attribute(attribute:"see_also", value:"https://www.redhat.com/security/data/cve/CVE-2013-2067.html");
      # https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform&downloadType=distributions
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?c7770d98");
      script_set_attribute(attribute:"solution", value:
    "Upgrade the installed JBoss Enterprise Application Platform 6.0.1 to
    6.1.0 or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2012/10/10");
      script_set_attribute(attribute:"patch_publication_date", value:"2013/05/20");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/06/24");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:redhat:jboss_enterprise_application_platform:6.0.1");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Red Hat Local Security Checks");
    
      script_copyright(english:"This script is Copyright (C) 2013-2019 Tenable Network Security, Inc.");
    
      script_dependencies("ssh_get_info.nasl", "jboss_detect.nbin");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    
    # We are only interested in Red Hat systems
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
    
    info = "";
    jboss = 0;
    installs = get_kb_list_or_exit("Host/JBoss/EAP");
    if(!isnull(installs)) jboss = 1;
    
    foreach install (make_list(installs))
    {
      match = eregmatch(string:install, pattern:"([^:]+):(.*)");
    
      if (!isnull(match))
      {
        ver = match[1];
        path = match[2];
    
        if (ver =~ "^6.0.1([^0-9]|$)")
        {
          info += '\n' + '  Path    : ' + path+ '\n';
          info += '  Version : ' + ver + '\n';
        }
      }
    }
    
    # Report what we found.
    if (info)
    {
      if (report_verbosity > 0)
      {
        if (max_index(split(info)) > 3) s = 's of the JBoss Enterprise Application Platform are';
        else s = ' of the JBoss Enterprise Application Platform is';
    
        report =
          '\n' +
          'The following instance'+s+' out of date and\nshould be upgraded to 6.1.0 or later :\n' +
          info;
    
        security_hole(port:0, extra:report);
      }
      else security_hole(port:0);
    }
    else if ( (!info) && (jboss) )
    {
      exit(0, "The JBoss Enterprise Application Platform version installed is not affected.");
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
    
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2013-0964.NASL
    descriptionUpdated tomcat6 packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies. A session fixation flaw was found in the Tomcat FormAuthenticator module. During a narrow window of time, if a remote attacker sent requests while a user was logging in, it could possibly result in the attacker
    last seen2020-06-01
    modified2020-06-02
    plugin id66965
    published2013-06-23
    reporterThis script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/66965
    titleCentOS 6 : tomcat6 (CESA-2013:0964)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20130620_TOMCAT6_ON_SL6_X.NASL
    descriptionA session fixation flaw was found in the Tomcat FormAuthenticator module. During a narrow window of time, if a remote attacker sent requests while a user was logging in, it could possibly result in the attacker
    last seen2020-03-18
    modified2013-06-21
    plugin id66952
    published2013-06-21
    reporterThis script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/66952
    titleScientific Linux Security Update : tomcat6 on SL6.x (noarch) (20130620)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2013-0839.NASL
    descriptionUpdated JBoss Enterprise Application Platform 6.1.0 packages that fix three security issues, various bugs, and add enhancements are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. This release serves as a replacement for JBoss Enterprise Application Platform 6.0.1, and includes bug fixes and enhancements. Refer to the 6.1.0 Release Notes for information on the most significant of these changes, available shortly from https://access.redhat.com/site/documentation/ Security fixes : XML encryption backwards compatibility attacks were found against various frameworks, including Apache CXF. An attacker could force a server to use insecure, legacy cryptosystems, even when secure cryptosystems were enabled on endpoints. By forcing the use of legacy cryptosystems, flaws such as CVE-2011-1096 and CVE-2011-2487 would be exposed, allowing plain text to be recovered from cryptograms and symmetric keys. (CVE-2012-5575) Note: Automatic checks to prevent CVE-2012-5575 are only run when WS-SecurityPolicy is used to enforce security requirements. It is best practice to use WS-SecurityPolicy to enforce security requirements. When applications running on JBoss Web used the COOKIE session tracking method, the org.apache.catalina.connector.Response.encodeURL() method returned the URL with the jsessionid appended as a query string parameter when processing the first request of a session. An attacker could possibly exploit this flaw by performing a man-in-the-middle attack to obtain a user
    last seen2020-06-01
    modified2020-06-02
    plugin id66523
    published2013-05-21
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/66523
    titleRHEL 5 : JBoss EAP (RHSA-2013:0839)
  • NASL familyWeb Servers
    NASL idTOMCAT_6_0_37.NASL
    descriptionAccording to its self-reported version number, the instance of Apache Tomcat 6.0 listening on the remote host is prior to 6.0.37. It is, therefore, affected by multiple vulnerabilities : - An error exists related to chunked transfer encoding and extensions that allows limited denial of service attacks. (CVE-2012-3544) - An error exists related to HTML form authentication and session fixation that allows an attacker to carry out requests using a victim
    last seen2020-03-18
    modified2013-05-15
    plugin id66426
    published2013-05-15
    reporterThis script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/66426
    titleApache Tomcat 6.0.x < 6.0.37 Multiple Vulnerabilities
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-2725.NASL
    descriptionTwo security issues have been found in the Tomcat servlet and JSP engine : - CVE-2012-3544 The input filter for chunked transfer encodings could trigger high resource consumption through malformed CRLF sequences, resulting in denial of service. - CVE-2013-2067 The FormAuthenticator module was vulnerable to session fixation.
    last seen2020-03-17
    modified2013-07-19
    plugin id68971
    published2013-07-19
    reporterThis script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/68971
    titleDebian DSA-2725-1 : tomcat6 - several vulnerabilities
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2013-0964.NASL
    descriptionFrom Red Hat Security Advisory 2013:0964 : Updated tomcat6 packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies. A session fixation flaw was found in the Tomcat FormAuthenticator module. During a narrow window of time, if a remote attacker sent requests while a user was logging in, it could possibly result in the attacker
    last seen2020-06-01
    modified2020-06-02
    plugin id68838
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/68838
    titleOracle Linux 6 : tomcat6 (ELSA-2013-0964)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2013-1437.NASL
    descriptionThe version of JBoss Enterprise Portal Platform on the remote system is affected by the following issues: - A flaw in CSRF prevention filter in JBoss Web could allow remote attackers to bypass the cross-site request forgery (CSRF) protection mechanism via a request that lacks a session identifier. (CVE-2012-4431) - A flaw that occurs when the COOKIE session tracking method is used can allow attackers to hijack users
    last seen2020-06-01
    modified2020-06-02
    plugin id72237
    published2014-01-31
    reporterThis script is Copyright (C) 2014-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/72237
    titleJBoss Portal 6.1.0 Update (RHSA-2013:1437)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2013-0834.NASL
    descriptionUpdated JBoss Enterprise Application Platform 6.1.0 packages that fix three security issues, various bugs, and add enhancements are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. This release serves as a replacement for JBoss Enterprise Application Platform 6.0.1, and includes bug fixes and enhancements. Refer to the 6.1.0 Release Notes for information on the most significant of these changes, available shortly from https://access.redhat.com/site/documentation/ Security fixes : XML encryption backwards compatibility attacks were found against various frameworks, including Apache CXF. An attacker could force a server to use insecure, legacy cryptosystems, even when secure cryptosystems were enabled on endpoints. By forcing the use of legacy cryptosystems, flaws such as CVE-2011-1096 and CVE-2011-2487 would be exposed, allowing plain text to be recovered from cryptograms and symmetric keys. (CVE-2012-5575) Note: Automatic checks to prevent CVE-2012-5575 are only run when WS-SecurityPolicy is used to enforce security requirements. It is best practice to use WS-SecurityPolicy to enforce security requirements. When applications running on JBoss Web used the COOKIE session tracking method, the org.apache.catalina.connector.Response.encodeURL() method returned the URL with the jsessionid appended as a query string parameter when processing the first request of a session. An attacker could possibly exploit this flaw by performing a man-in-the-middle attack to obtain a user
    last seen2020-06-01
    modified2020-06-02
    plugin id66522
    published2013-05-21
    reporterThis script is Copyright (C) 2013-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/66522
    titleRHEL 6 : JBoss EAP (RHSA-2013:0834)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2013-0964.NASL
    descriptionUpdated tomcat6 packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies. A session fixation flaw was found in the Tomcat FormAuthenticator module. During a narrow window of time, if a remote attacker sent requests while a user was logging in, it could possibly result in the attacker
    last seen2020-06-01
    modified2020-06-02
    plugin id66949
    published2013-06-21
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/66949
    titleRHEL 6 : tomcat6 (RHSA-2013:0964)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2013-633.NASL
    descriptionTomcat was updated to fix security issues and bug: CVE-2013-1976: Avoid a potential symlink race during startup of the tomcat server, where a local attacker that gaine access to the tomcat chroot could escalate privileges to root. CVE-2013-2067: java/org/apache/catalina/authenticator/FormAuthenticator.java in the form authentication feature in Apache Tomcat did not properly handle the relationships between authentication requirements and sessions, which allows remote attackers to inject a request into a session by sending this request during completion of the login form, a variant of a session fixation attack. CVE-2012-3544: Tomcat were affected by a chunked transfer encoding extension size denial of service vulnerability. Also the following bug was fixed : - Fix tomcat init scripts generating malformed classpath (http://youtrack.jetbrains.com/issue/JT-18545) bnc#804992
    last seen2020-06-05
    modified2014-06-13
    plugin id75107
    published2014-06-13
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/75107
    titleopenSUSE Security Update : tomcat (openSUSE-SU-2013:1307-1)
  • NASL familySolaris Local Security Checks
    NASL idSOLARIS11_TOMCAT_20140401_2.NASL
    descriptionThe remote Solaris system is missing necessary patches to address security updates : - Apache Tomcat 6.x before 6.0.37 and 7.x before 7.0.30 does not properly handle chunk extensions in chunked transfer coding, which allows remote attackers to cause a denial of service by streaming data. (CVE-2012-3544) - java/org/apache/catalina/authenticator/FormAuthenticator .java in the form authentication feature in Apache Tomcat 6.0.21 through 6.0.36 and 7.x before 7.0.33 does not properly handle the relationships between authentication requirements and sessions, which allows remote attackers to inject a request into a session by sending this request during completion of the login form, a variant of a session fixation attack. (CVE-2013-2067)
    last seen2020-06-01
    modified2020-06-02
    plugin id80792
    published2015-01-19
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/80792
    titleOracle Solaris Third-Party Patch Update : tomcat (multiple_vulnerabilities_in_tomcat)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2013-1011.NASL
    descriptionRed Hat JBoss Web Server 2.0.1, which fixes multiple security issues and several bugs, is now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector (mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat Native library. This release serves as a replacement for Red Hat JBoss Web Server 2.0.0, and includes several bug fixes. Refer to the Red Hat JBoss Web Server 2.0.1 Release Notes for information on the most significant of these changes, available shortly from https://access.redhat.com/site/documentation/ The following security issues are also fixed with this release : Cross-site scripting (XSS) flaws were found in the Apache HTTP Server mod_proxy_balancer module
    last seen2020-06-01
    modified2020-06-02
    plugin id76237
    published2014-06-26
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/76237
    titleRHEL 5 : JBoss Web Server (RHSA-2013:1011)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2014-042.NASL
    descriptionUpdated tomcat6 packages fix security vulnerabilities : It was discovered that Tomcat incorrectly handled certain requests submitted using chunked transfer encoding. A remote attacker could use this flaw to cause the Tomcat server to stop responding, resulting in a denial of service (CVE-2012-3544). A frame injection in the Javadoc component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier; JavaFX 2.2.21 and earlier; and OpenJDK 7 allows remote attackers to affect integrity via unknown vectors related to Javadoc (CVE-2013-1571). A flaw was found in the way the tomcat6 init script handled the tomcat6-initd.log log file. A malicious web application deployed on Tomcat could use this flaw to perform a symbolic link attack to change the ownership of an arbitrary system file to that of the tomcat user, allowing them to escalate their privileges to root (CVE-2013-1976). It was discovered that Tomcat incorrectly handled certain authentication requests. A remote attacker could possibly use this flaw to inject a request that would get executed with a victim
    last seen2020-06-01
    modified2020-06-02
    plugin id72595
    published2014-02-20
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/72595
    titleMandriva Linux Security Advisory : tomcat6 (MDVSA-2014:042)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-2897.NASL
    descriptionMultiple security issues were found in the Tomcat servlet and JSP engine : - CVE-2013-2067 FORM authentication associates the most recent request requiring authentication with the current session. By repeatedly sending a request for an authenticated resource while the victim is completing the login form, an attacker could inject a request that would be executed using the victim
    last seen2020-03-17
    modified2014-04-09
    plugin id73421
    published2014-04-09
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/73421
    titleDebian DSA-2897-1 : tomcat7 - security update
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-1841-1.NASL
    descriptionIt was discovered that Tomcat incorrectly handled certain requests submitted using chunked transfer encoding. A remote attacker could use this flaw to cause the Tomcat server to stop responding, resulting in a denial of service. This issue only affected Ubuntu 10.04 LTS and Ubuntu 12.04 LTS. (CVE-2012-3544) It was discovered that Tomcat incorrectly handled certain authentication requests. A remote attacker could possibly use this flaw to inject a request that would get executed with a victim
    last seen2020-06-01
    modified2020-06-02
    plugin id66670
    published2013-05-29
    reporterUbuntu Security Notice (C) 2013-2019 Canonical, Inc. / NASL script (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/66670
    titleUbuntu 10.04 LTS / 12.04 LTS / 12.10 / 13.04 : tomcat6, tomcat7 vulnerabilities (USN-1841-1)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2013-1012.NASL
    descriptionRed Hat JBoss Web Server 2.0.1, which fixes multiple security issues and several bugs, is now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector (mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat Native library. This release serves as a replacement for Red Hat JBoss Web Server 2.0.0, and includes several bug fixes. Refer to the Red Hat JBoss Web Server 2.0.1 Release Notes for information on the most significant of these changes, available shortly from https://access.redhat.com/site/documentation/ The following security issues are also fixed with this release : Cross-site scripting (XSS) flaws were found in the Apache HTTP Server mod_proxy_balancer module
    last seen2020-06-01
    modified2020-06-02
    plugin id76238
    published2014-06-26
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/76238
    titleRHEL 6 : JBoss Web Server (RHSA-2013:1012)
  • NASL familyMisc.
    NASL idORACLE_SECURE_GLOBAL_DESKTOP_JAN_2014_CPU.NASL
    descriptionThe remote host has a version of Oracle Secure Global Desktop installed that is affected by multiple vulnerabilities : - Specially crafted requests sent with chunked transfer encoding could allow a remote attacker to perform a
    last seen2020-06-01
    modified2020-06-02
    plugin id72339
    published2014-02-05
    reporterThis script is Copyright (C) 2014-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/72339
    titleOracle Secure Global Desktop Multiple Vulnerabilities (January 2014 CPU)

Redhat

advisories
  • bugzilla
    id961779
    titleCVE-2013-2067 tomcat: Session fixation in form authenticator
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 6 is installed
        ovaloval:com.redhat.rhba:tst:20111656003
      • OR
        • AND
          • commenttomcat6 is earlier than 0:6.0.24-57.el6_4
            ovaloval:com.redhat.rhsa:tst:20130964001
          • commenttomcat6 is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110335008
        • AND
          • commenttomcat6-jsp-2.1-api is earlier than 0:6.0.24-57.el6_4
            ovaloval:com.redhat.rhsa:tst:20130964003
          • commenttomcat6-jsp-2.1-api is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110335006
        • AND
          • commenttomcat6-el-2.1-api is earlier than 0:6.0.24-57.el6_4
            ovaloval:com.redhat.rhsa:tst:20130964005
          • commenttomcat6-el-2.1-api is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110335018
        • AND
          • commenttomcat6-lib is earlier than 0:6.0.24-57.el6_4
            ovaloval:com.redhat.rhsa:tst:20130964007
          • commenttomcat6-lib is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110335010
        • AND
          • commenttomcat6-servlet-2.5-api is earlier than 0:6.0.24-57.el6_4
            ovaloval:com.redhat.rhsa:tst:20130964009
          • commenttomcat6-servlet-2.5-api is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110335002
        • AND
          • commenttomcat6-docs-webapp is earlier than 0:6.0.24-57.el6_4
            ovaloval:com.redhat.rhsa:tst:20130964011
          • commenttomcat6-docs-webapp is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110335016
        • AND
          • commenttomcat6-admin-webapps is earlier than 0:6.0.24-57.el6_4
            ovaloval:com.redhat.rhsa:tst:20130964013
          • commenttomcat6-admin-webapps is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110335004
        • AND
          • commenttomcat6-webapps is earlier than 0:6.0.24-57.el6_4
            ovaloval:com.redhat.rhsa:tst:20130964015
          • commenttomcat6-webapps is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110335020
        • AND
          • commenttomcat6-javadoc is earlier than 0:6.0.24-57.el6_4
            ovaloval:com.redhat.rhsa:tst:20130964017
          • commenttomcat6-javadoc is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110335012
    rhsa
    idRHSA-2013:0964
    released2013-06-20
    severityModerate
    titleRHSA-2013:0964: tomcat6 security update (Moderate)
  • rhsa
    idRHSA-2013:0833
  • rhsa
    idRHSA-2013:0834
  • rhsa
    idRHSA-2013:0839
  • rhsa
    idRHSA-2013:1437
rpms
  • apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6
  • apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6
  • apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6
  • apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6
  • apache-cxf-0:2.6.6-20.redhat_3.ep6.el6
  • apache-cxf-xjc-utils-0:2.6.0-1.redhat_1.ep6.el6
  • atinject-0:1-9.redhat_3.ep6.el6
  • atinject-eap6-0:1-3.redhat_3.ep6.el6
  • codehaus-jackson-0:1.9.9-4.redhat_2.ep6.el6
  • codehaus-jackson-core-asl-0:1.9.9-4.redhat_2.ep6.el6
  • codehaus-jackson-jaxrs-0:1.9.9-4.redhat_2.ep6.el6
  • codehaus-jackson-mapper-asl-0:1.9.9-4.redhat_2.ep6.el6
  • codehaus-jackson-xc-0:1.9.9-4.redhat_2.ep6.el6
  • cxf-xjc-boolean-0:2.6.0-1.redhat_1.ep6.el6
  • cxf-xjc-dv-0:2.6.0-1.redhat_1.ep6.el6
  • cxf-xjc-ts-0:2.6.0-1.redhat_1.ep6.el6
  • dom4j-0:1.6.1-19.redhat_5.ep6.el6
  • dom4j-eap6-0:1.6.1-19.redhat_5.ep6.el6
  • ecj3-1:3.7.2-6.redhat_1.ep6.el6
  • glassfish-javamail-0:1.4.5-1.redhat_1.ep6.el6
  • glassfish-jaxb-0:2.2.5-14.redhat_5.ep6.el6
  • glassfish-jaxb-eap6-0:2.2.5-14.redhat_5.ep6.el6
  • glassfish-jsf-0:2.1.19-2.redhat_1.ep6.el6
  • glassfish-jsf12-0:1.2_15-12_b01_redhat_3.ep6.el6
  • guava-0:13.0.1-1.redhat_1.ep6.el6.1
  • h2database-0:1.3.168-3_redhat_2.ep6.el6
  • hibernate4-0:4.2.0-3.Final_redhat_1.ep6.el6
  • hibernate4-core-0:4.2.0-3.Final_redhat_1.ep6.el6
  • hibernate4-entitymanager-0:4.2.0-3.Final_redhat_1.ep6.el6
  • hibernate4-envers-0:4.2.0-3.Final_redhat_1.ep6.el6
  • hibernate4-infinispan-0:4.2.0-3.Final_redhat_1.ep6.el6
  • hibernate4-validator-0:4.3.1-1.Final_redhat_1.1.ep6.el6.4
  • hornetq-0:2.3.1-1.Final_redhat_1.ep6.el6
  • hornetq-native-0:2.3.1-1.Final_redhat_1.ep6.el6
  • hornetq-native-debuginfo-0:2.3.1-1.Final_redhat_1.ep6.el6
  • httpclient-0:4.2.1-7.redhat_1.ep6.el6
  • httpcomponents-client-0:4.2.1-7.redhat_1.ep6.el6
  • httpcomponents-core-0:4.2.1-7.redhat_1.ep6.el6
  • httpcomponents-project-0:6-7.redhat_1.ep6.el6
  • httpcore-0:4.2.1-7.redhat_1.ep6.el6
  • httpd-0:2.2.22-18.ep6.el6
  • httpd-debuginfo-0:2.2.22-18.ep6.el6
  • httpd-devel-0:2.2.22-18.ep6.el6
  • httpd-tools-0:2.2.22-18.ep6.el6
  • httpmime-0:4.2.1-7.redhat_1.ep6.el6
  • infinispan-0:5.2.6-1.Final_redhat_1.ep6.el6
  • infinispan-cachestore-jdbc-0:5.2.6-1.Final_redhat_1.ep6.el6
  • infinispan-cachestore-remote-0:5.2.6-1.Final_redhat_1.ep6.el6
  • infinispan-client-hotrod-0:5.2.6-1.Final_redhat_1.ep6.el6
  • infinispan-core-0:5.2.6-1.Final_redhat_1.ep6.el6
  • ironjacamar-0:1.0.17-1.Final_redhat_1.ep6.el6
  • jacorb-jboss-0:2.3.2-11.redhat_4.ep6.el6
  • jansi-0:1.9-2.redhat_1.ep6.el6
  • jaxbintros-0:1.0.2-14.GA_redhat_4.ep6.el6
  • jbosgi-deployment-0:1.3.0-2.Final_redhat_1.ep6.el6
  • jbosgi-framework-core-0:2.1.0-2.Final_redhat_1.ep6.el6
  • jbosgi-metadata-0:2.2.0-1.Final_redhat_1.ep6.el6
  • jbosgi-repository-0:2.1.0-1.Final_redhat_1.ep6.el6
  • jbosgi-resolver-0:3.0.1-1.Final_redhat_1.ep6.el6
  • jbosgi-spi-0:3.2.0-1.Final_redhat_1.ep6.el6
  • jbosgi-vfs-0:1.2.1-1.Final_redhat_1.ep6.el6
  • jboss-aesh-0:0.33.3-1_redhat_1.ep6.el6
  • jboss-as-appclient-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-cli-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-client-all-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-clustering-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-cmp-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-configadmin-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-connector-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-console-0:1.5.2-1.Final_redhat_1.ep6.el6
  • jboss-as-controller-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-controller-client-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-deployment-repository-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-deployment-scanner-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-domain-http-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-domain-management-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-ee-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-ee-deployment-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-ejb3-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-embedded-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-host-controller-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-jacorb-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-jaxr-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-jaxrs-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-jdr-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-jmx-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-jpa-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-jsf-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-jsr77-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-logging-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-mail-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-management-client-content-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-messaging-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-modcluster-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-naming-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-network-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-osgi-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-osgi-configadmin-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-osgi-service-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-platform-mbean-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-pojo-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-process-controller-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-protocol-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-remoting-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-sar-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-security-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-server-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-system-jmx-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-threads-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-transactions-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-version-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-web-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-webservices-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-weld-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-as-xts-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jboss-common-beans-0:1.1.0-1.Final_redhat_1.ep6.el6
  • jboss-dmr-0:1.1.6-1.Final_redhat_1.ep6.el6
  • jboss-ejb-client-0:1.0.21-1.Final_redhat_1.ep6.el6
  • jboss-jaxrpc-api_1.1_spec-0:1.0.1-4.Final_redhat_3.ep6.el6
  • jboss-jaxrs-api_1.1_spec-0:1.0.1-7.Final_redhat_2.ep6.el6
  • jboss-jms-api_1.1_spec-0:1.0.1-6.Final_redhat_2.ep6.el6
  • jboss-jsf-api_2.1_spec-0:2.1.19.1-1.Final_redhat_1.ep6.el6
  • jboss-logmanager-0:1.4.0-1.Final_redhat_1.ep6.el6
  • jboss-marshalling-0:1.3.16-.GA.redhat_1.ep6.el6
  • jboss-metadata-0:7.0.8-1.Final_redhat_1.ep6.el6
  • jboss-metadata-appclient-0:7.0.8-1.Final_redhat_1.ep6.el6
  • jboss-metadata-common-0:7.0.8-1.Final_redhat_1.ep6.el6
  • jboss-metadata-ear-0:7.0.8-1.Final_redhat_1.ep6.el6
  • jboss-metadata-ejb-0:7.0.8-1.Final_redhat_1.ep6.el6
  • jboss-metadata-web-0:7.0.8-1.Final_redhat_1.ep6.el6
  • jboss-modules-0:1.2.0-2.Final_redhat_1.ep6.el6
  • jboss-msc-0:1.0.4-1.GA_redhat_1.ep6.el6
  • jboss-remote-naming-0:1.0.6-2.Final_redhat_2.ep6.el6
  • jboss-remoting3-0:3.2.16-1.GA_redhat_1.ep6.el6
  • jboss-remoting3-jmx-0:1.1.0-1.Final_redhat_1.ep6.el6
  • jboss-security-negotiation-0:2.2.5-1.Final_redhat_1.ep6.el6
  • jboss-servlet-api_3.0_spec-0:1.0.2-1.Final_redhat_1.ep6.el6
  • jboss-threads-0:2.1.0-1.Final_redhat_1.ep6.el6
  • jboss-transaction-api_1.1_spec-0:1.0.1-6.Final_redhat_2.ep6.el6
  • jbossas-appclient-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jbossas-bundles-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jbossas-core-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jbossas-domain-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jbossas-hornetq-native-0:2.3.1-1.Final_redhat_1.ep6.el6
  • jbossas-javadocs-0:7.2.0-7.Final_redhat_7.ep6.el6
  • jbossas-jbossweb-native-0:1.1.27-4.redhat_1.ep6.el6
  • jbossas-modules-eap-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jbossas-product-eap-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jbossas-standalone-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jbossas-welcome-content-eap-0:7.2.0-8.Final_redhat_8.ep6.el6
  • jbossts-1:4.17.4-3.Final_redhat_2.ep6.el6
  • jbossweb-0:7.2.0-2.redhat_1.ep6.el6
  • jbossws-api-0:1.0.1-1.Final_redhat_1.ep6.el6
  • jbossws-common-0:2.1.1-1.Final_redhat_2.ep6.el6
  • jbossws-common-tools-0:1.1.0-1.Final_redhat_1.ep6.el6
  • jbossws-cxf-0:4.1.3-1.Final_redhat_3.ep6.el6.2
  • jbossws-native-0:4.1.1-1.Final_redhat_1.ep6.el6
  • jbossws-spi-0:2.1.2-1.Final_redhat_1.ep6.el6
  • jcip-annotations-0:1.0-3.redhat_3.ep6.el6
  • jcip-annotations-eap6-0:1.0-3.1.redhat_3.ep6.el6
  • jgroups-1:3.2.7-1.Final_redhat_1.ep6.el6
  • joda-time-0:1.6.2-5.redhat_4.ep6.el6.5
  • jul-to-slf4j-stub-0:1.0.1-1.Final_redhat_1.1.ep6.el6.2
  • mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6
  • mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6
  • mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6
  • mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6
  • mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6
  • mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6
  • mod_ssl-1:2.2.22-18.ep6.el6
  • netty-0:3.6.2-1_redhat_1.1.ep6.el6
  • objectweb-asm-eap6-0:3.3.1-6.2.redhat_4.ep6.el6
  • opensaml-0:2.5.1-1.redhat_1.ep6.el6.2
  • openws-0:1.4.2-9_redhat_3.ep6.el6
  • org.osgi.core-0:4.2.0-9.redhat_3.ep6.el6
  • org.osgi.enterprise-0:4.2.0-9.redhat_3.ep6.el6
  • picketbox-0:4.0.17-1.Final_redhat_1.ep6.el6
  • picketlink-federation-0:2.1.6-3.Final_redhat_2.ep6.el6
  • relaxngDatatype-0:2011.1-4.redhat_6.ep6.el6
  • relaxngDatatype-eap6-0:2011.1-4.redhat_6.ep6.el6
  • resteasy-0:2.3.6-1.Final_redhat_1.ep6.el6
  • slf4j-eap6-0:1.7.2-10.redhat_1.ep6.el6
  • slf4j-jboss-logmanager-0:1.0.2-1.GA_redhat_1.3.ep6.el6.2
  • sun-ws-metadata-2.0-api-0:1.0.MR1-12_MR1_redhat_3.ep6.el6.5
  • tomcat-native-0:1.1.27-4.redhat_1.ep6.el6
  • tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6
  • velocity-eap6-0:1.7-2.1.redhat_2.ep6.el6
  • weld-cdi-1.0-api-0:1.0-8.SP4_redhat_2.ep6.el6
  • weld-core-0:1.1.13-1.Final_redhat_1.ep6.el6.1
  • woodstox-core-asl-0:4.2.0-7.redhat_2.ep6.el6
  • woodstox-stax2-api-0:3.1.1-7.redhat_3.ep6.el6
  • wsdl4j-eap6-0:1.6.2-12.3.redhat_4.ep6.el6
  • wss4j-0:1.6.9-2.redhat_2.ep6.el6
  • xerces-j2-eap6-0:2.9.1-14_redhat_4.ep6.el6
  • xml-commons-resolver-eap6-0:1.2-10.redhat_3.ep6.el6.4
  • xml-security-0:1.5.3-1.redhat_1.ep6.el6
  • xmltooling-0:1.3.2-10.redhat_4.ep6.el6
  • apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5
  • apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5
  • apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el5
  • apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5
  • apache-cxf-0:2.6.6-20.redhat_3.ep6.el5
  • apache-cxf-xjc-utils-0:2.6.0-1.redhat_1.ep6.el5
  • atinject-0:1-9.redhat_3.ep6.el5
  • atinject-eap6-0:1-3.redhat_3.ep6.el5
  • codehaus-jackson-0:1.9.9-4.redhat_2.ep6.el5
  • codehaus-jackson-core-asl-0:1.9.9-4.redhat_2.ep6.el5
  • codehaus-jackson-jaxrs-0:1.9.9-4.redhat_2.ep6.el5
  • codehaus-jackson-mapper-asl-0:1.9.9-4.redhat_2.ep6.el5
  • codehaus-jackson-xc-0:1.9.9-4.redhat_2.ep6.el5
  • cxf-xjc-boolean-0:2.6.0-1.redhat_1.ep6.el5
  • cxf-xjc-dv-0:2.6.0-1.redhat_1.ep6.el5
  • cxf-xjc-ts-0:2.6.0-1.redhat_1.ep6.el5
  • dom4j-0:1.6.1-19.redhat_5.ep6.el5
  • dom4j-eap6-0:1.6.1-19.redhat_5.ep6.el5
  • ecj3-1:3.7.2-6.redhat_1.ep6.el5
  • glassfish-javamail-0:1.4.5-1.redhat_1.ep6.el5
  • glassfish-jaxb-0:2.2.5-14.redhat_5.ep6.el5
  • glassfish-jaxb-eap6-0:2.2.5-14.redhat_5.ep6.el5
  • glassfish-jsf-0:2.1.19-2.redhat_1.ep6.el5
  • glassfish-jsf12-0:1.2_15-12_b01_redhat_3.ep6.el5
  • guava-0:13.0.1-1.redhat_1.ep6.el5.1
  • h2database-0:1.3.168-3_redhat_2.ep6.el5
  • hibernate4-0:4.2.0-4.Final_redhat_1.ep6.el5
  • hibernate4-core-0:4.2.0-4.Final_redhat_1.ep6.el5
  • hibernate4-entitymanager-0:4.2.0-4.Final_redhat_1.ep6.el5
  • hibernate4-envers-0:4.2.0-4.Final_redhat_1.ep6.el5
  • hibernate4-infinispan-0:4.2.0-4.Final_redhat_1.ep6.el5
  • hibernate4-validator-0:4.3.1-1.Final_redhat_1.1.ep6.el5.5
  • hornetq-0:2.3.1-1.Final_redhat_1.ep6.el5
  • hornetq-native-0:2.3.1-1.Final_redhat_1.ep6.el5
  • hornetq-native-debuginfo-0:2.3.1-1.Final_redhat_1.ep6.el5
  • httpclient-0:4.2.1-7.redhat_1.ep6.el5
  • httpcomponents-client-0:4.2.1-7.redhat_1.ep6.el5
  • httpcomponents-core-0:4.2.1-7.redhat_1.ep6.el5
  • httpcomponents-project-0:6-7.redhat_1.ep6.el5
  • httpcore-0:4.2.1-7.redhat_1.ep6.el5
  • httpd-0:2.2.22-19.ep6.el5
  • httpd-debuginfo-0:2.2.22-19.ep6.el5
  • httpd-devel-0:2.2.22-19.ep6.el5
  • httpd-tools-0:2.2.22-19.ep6.el5
  • httpmime-0:4.2.1-7.redhat_1.ep6.el5
  • infinispan-0:5.2.6-1.Final_redhat_1.ep6.el5
  • infinispan-cachestore-jdbc-0:5.2.6-1.Final_redhat_1.ep6.el5
  • infinispan-cachestore-remote-0:5.2.6-1.Final_redhat_1.ep6.el5
  • infinispan-client-hotrod-0:5.2.6-1.Final_redhat_1.ep6.el5
  • infinispan-core-0:5.2.6-1.Final_redhat_1.ep6.el5
  • ironjacamar-0:1.0.17-1.Final_redhat_1.ep6.el5
  • jacorb-jboss-0:2.3.2-11.redhat_4.ep6.el5
  • jansi-0:1.9-2.redhat_1.ep6.el5
  • jaxbintros-0:1.0.2-14.GA_redhat_4.ep6.el5
  • jbosgi-deployment-0:1.3.0-2.Final_redhat_1.ep6.el5
  • jbosgi-framework-core-0:2.1.0-2.Final_redhat_1.ep6.el5
  • jbosgi-metadata-0:2.2.0-1.Final_redhat_1.ep6.el5
  • jbosgi-repository-0:2.1.0-1.Final_redhat_1.ep6.el5
  • jbosgi-resolver-0:3.0.1-1.Final_redhat_1.ep6.el5
  • jbosgi-spi-0:3.2.0-1.Final_redhat_1.ep6.el5
  • jbosgi-vfs-0:1.2.1-1.Final_redhat_1.ep6.el5
  • jboss-aesh-0:0.33.3-1_redhat_1.ep6.el5
  • jboss-as-appclient-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-cli-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-client-all-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-clustering-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-cmp-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-configadmin-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-connector-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-console-0:1.5.2-1.Final_redhat_1.ep6.el5
  • jboss-as-controller-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-controller-client-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-deployment-repository-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-deployment-scanner-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-domain-http-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-domain-management-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-ee-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-ee-deployment-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-ejb3-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-embedded-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-host-controller-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-jacorb-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-jaxr-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-jaxrs-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-jdr-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-jmx-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-jpa-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-jsf-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-jsr77-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-logging-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-mail-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-management-client-content-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-messaging-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-modcluster-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-naming-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-network-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-osgi-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-osgi-configadmin-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-osgi-service-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-platform-mbean-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-pojo-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-process-controller-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-protocol-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-remoting-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-sar-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-security-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-server-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-system-jmx-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-threads-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-transactions-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-version-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-web-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-webservices-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-weld-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-as-xts-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jboss-common-beans-0:1.1.0-1.Final_redhat_1.ep6.el5
  • jboss-dmr-0:1.1.6-1.Final_redhat_1.ep6.el5
  • jboss-ejb-client-0:1.0.21-1.Final_redhat_1.ep6.el5
  • jboss-jaxrpc-api_1.1_spec-0:1.0.1-4.Final_redhat_3.ep6.el5
  • jboss-jaxrs-api_1.1_spec-0:1.0.1-7.Final_redhat_2.ep6.el5
  • jboss-jms-api_1.1_spec-0:1.0.1-6.Final_redhat_2.ep6.el5
  • jboss-jsf-api_2.1_spec-0:2.1.19.1-1.Final_redhat_1.ep6.el5
  • jboss-logmanager-0:1.4.0-1.Final_redhat_1.ep6.el5
  • jboss-marshalling-0:1.3.16-.GA.redhat_1.ep6.el5
  • jboss-metadata-0:7.0.8-1.Final_redhat_1.ep6.el5
  • jboss-metadata-appclient-0:7.0.8-1.Final_redhat_1.ep6.el5
  • jboss-metadata-common-0:7.0.8-1.Final_redhat_1.ep6.el5
  • jboss-metadata-ear-0:7.0.8-1.Final_redhat_1.ep6.el5
  • jboss-metadata-ejb-0:7.0.8-1.Final_redhat_1.ep6.el5
  • jboss-metadata-web-0:7.0.8-1.Final_redhat_1.ep6.el5
  • jboss-modules-0:1.2.0-2.Final_redhat_1.ep6.el5
  • jboss-msc-0:1.0.4-1.GA_redhat_1.ep6.el5
  • jboss-remote-naming-0:1.0.6-2.Final_redhat_2.ep6.el5
  • jboss-remoting3-0:3.2.16-1.GA_redhat_1.ep6.el5
  • jboss-remoting3-jmx-0:1.1.0-1.Final_redhat_1.ep6.el5
  • jboss-security-negotiation-0:2.2.5-1.Final_redhat_1.ep6.el5
  • jboss-servlet-api_3.0_spec-0:1.0.2-1.Final_redhat_1.ep6.el5
  • jboss-threads-0:2.1.0-1.Final_redhat_1.ep6.el5
  • jboss-transaction-api_1.1_spec-0:1.0.1-6.Final_redhat_2.ep6.el5
  • jbossas-appclient-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jbossas-bundles-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jbossas-core-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jbossas-domain-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jbossas-hornetq-native-0:2.3.1-1.Final_redhat_1.ep6.el5
  • jbossas-javadocs-0:7.2.0-7.Final_redhat_7.ep6.el5
  • jbossas-jbossweb-native-0:1.1.27-4.redhat_1.ep6.el5
  • jbossas-modules-eap-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jbossas-product-eap-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jbossas-standalone-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jbossas-welcome-content-eap-0:7.2.0-8.Final_redhat_8.ep6.el5
  • jbossts-1:4.17.4-3.Final_redhat_2.ep6.el5
  • jbossweb-0:7.2.0-2.redhat_1.ep6.el5
  • jbossws-api-0:1.0.1-1.Final_redhat_1.ep6.el5
  • jbossws-common-0:2.1.1-1.Final_redhat_2.ep6.el5
  • jbossws-common-tools-0:1.1.0-1.Final_redhat_1.ep6.el5
  • jbossws-cxf-0:4.1.3-1.Final_redhat_3.ep6.el5.2
  • jbossws-native-0:4.1.1-1.Final_redhat_1.ep6.el5
  • jbossws-spi-0:2.1.2-1.Final_redhat_1.ep6.el5
  • jcip-annotations-0:1.0-3.redhat_3.ep6.el5
  • jcip-annotations-eap6-0:1.0-3.1.redhat_3.ep6.el5
  • jgroups-1:3.2.7-1.Final_redhat_1.ep6.el5
  • joda-time-0:1.6.2-5.redhat_4.ep6.el5.5
  • jul-to-slf4j-stub-0:1.0.1-1.Final_redhat_1.1.ep6.el5.2
  • mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5
  • mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5
  • mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5
  • mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el5
  • mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5
  • mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el5
  • mod_ssl-1:2.2.22-19.ep6.el5
  • netty-0:3.6.2-1_redhat_1.1.ep6.el5
  • objectweb-asm-eap6-0:3.3.1-6.2.redhat_4.ep6.el5
  • opensaml-0:2.5.1-1.redhat_1.ep6.el5.2
  • openws-0:1.4.2-9_redhat_3.ep6.el5
  • org.osgi.core-0:4.2.0-9.redhat_3.ep6.el5
  • org.osgi.enterprise-0:4.2.0-9.redhat_3.ep6.el5
  • picketbox-0:4.0.17-1.Final_redhat_1.ep6.el5
  • picketlink-federation-0:2.1.6-3.Final_redhat_2.ep6.el5
  • relaxngDatatype-0:2011.1-4.redhat_6.ep6.el5
  • relaxngDatatype-eap6-0:2011.1-4.redhat_6.ep6.el5
  • resteasy-0:2.3.6-1.Final_redhat_1.ep6.el5
  • slf4j-0:1.7.2-10.redhat_1.ep6.el5
  • slf4j-eap6-0:1.7.2-10.redhat_1.ep6.el5
  • slf4j-jboss-logmanager-0:1.0.2-1.GA_redhat_1.3.ep6.el5.2
  • sun-ws-metadata-2.0-api-0:1.0.MR1-12_MR1_redhat_3.ep6.el5.5
  • tomcat-native-0:1.1.27-4.redhat_1.ep6.el5
  • tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el5
  • velocity-eap6-0:1.7-2.1.redhat_2.ep6.el5
  • weld-cdi-1.0-api-0:1.0-8.SP4_redhat_2.ep6.el5
  • weld-core-0:1.1.13-1.Final_redhat_1.ep6.el5.1
  • woodstox-core-0:4.2.0-7.redhat_2.ep6.el5
  • woodstox-stax2-api-0:3.1.1-7.redhat_3.ep6.el5
  • wsdl4j-eap6-0:1.6.2-12.3.redhat_4.ep6.el5
  • wss4j-0:1.6.9-2.redhat_2.ep6.el5
  • xerces-j2-eap6-0:2.9.1-14_redhat_4.ep6.el5
  • xml-commons-resolver-eap6-0:1.2-10.redhat_3.ep6.el5.4
  • xml-security-0:1.5.3-1.redhat_1.ep6.el5
  • xmltooling-0:1.3.2-10.redhat_4.ep6.el5
  • tomcat6-0:6.0.24-57.el6_4
  • tomcat6-admin-webapps-0:6.0.24-57.el6_4
  • tomcat6-docs-webapp-0:6.0.24-57.el6_4
  • tomcat6-el-2.1-api-0:6.0.24-57.el6_4
  • tomcat6-javadoc-0:6.0.24-57.el6_4
  • tomcat6-jsp-2.1-api-0:6.0.24-57.el6_4
  • tomcat6-lib-0:6.0.24-57.el6_4
  • tomcat6-servlet-2.5-api-0:6.0.24-57.el6_4
  • tomcat6-webapps-0:6.0.24-57.el6_4
  • apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5
  • apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5
  • apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el5
  • apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5
  • apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5
  • dom4j-0:1.6.1-19.redhat_5.ep6.el5
  • ecj3-1:3.7.2-6.redhat_1.ep6.el5
  • httpd-0:2.2.22-23.ep6.el5
  • httpd-debuginfo-0:2.2.22-23.ep6.el5
  • httpd-devel-0:2.2.22-23.ep6.el5
  • httpd-manual-0:2.2.22-23.ep6.el5
  • httpd-tools-0:2.2.22-23.ep6.el5
  • mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5
  • mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5
  • mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5
  • mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el5
  • mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5
  • mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5
  • mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5
  • mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el5
  • mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5
  • mod_ssl-1:2.2.22-23.ep6.el5
  • tomcat-native-0:1.1.27-4.redhat_1.ep6.el5
  • tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el5
  • tomcat6-0:6.0.37-8_patch_01.ep6.el5
  • tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5
  • tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5
  • tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5
  • tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5
  • tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5
  • tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5
  • tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5
  • tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5
  • tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5
  • tomcat7-0:7.0.40-9_patch_01.ep6.el5
  • tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5
  • tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5
  • tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5
  • tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5
  • tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5
  • tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5
  • tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5
  • tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5
  • tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5
  • apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6
  • apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6
  • apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6
  • apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6
  • apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6
  • dom4j-0:1.6.1-19.redhat_5.ep6.el6
  • ecj3-1:3.7.2-6.redhat_1.ep6.el6
  • httpd-0:2.2.22-23.ep6.el6
  • httpd-debuginfo-0:2.2.22-23.ep6.el6
  • httpd-devel-0:2.2.22-23.ep6.el6
  • httpd-manual-0:2.2.22-23.ep6.el6
  • httpd-tools-0:2.2.22-23.ep6.el6
  • mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6
  • mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6
  • mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6
  • mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6
  • mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6
  • mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6
  • mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6
  • mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6
  • mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6
  • mod_ssl-1:2.2.22-23.ep6.el6
  • tomcat-native-0:1.1.27-4.redhat_1.ep6.el6
  • tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6
  • tomcat6-0:6.0.37-10_patch_01.ep6.el6
  • tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6
  • tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6
  • tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6
  • tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6
  • tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6
  • tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6
  • tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6
  • tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6
  • tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6
  • tomcat7-0:7.0.40-5_patch_01.ep6.el6
  • tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6
  • tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6
  • tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6
  • tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6
  • tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6
  • tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6
  • tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6
  • tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6
  • tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6

Seebug

  • bulletinFamilyexploit
    descriptionCVE ID:CVE-2013-1493、CVE-2013-2067、CVE-2013-6202 HP Service Manager是一款软件即服务可以帮助您迅速部署一个全面的IT 服务管理解决方案。 HP Service Manager存在多个安全漏洞: 1,不正确过滤返回给用户的输入,允许远程攻击者利用漏洞构建恶意URI,诱使用户解析,当恶意数据被查看时,可获取敏感信息或劫持用户会话。 2,应用程序存在跨站请求伪造漏洞,允许远程攻击者构建恶意URI,诱使用户解析,可以目标用户上下文执行恶意操作。 3,存在未明错误,允许攻击者利用漏洞执行任意代码,目前没有详细漏洞细节提供。 4,存在未明错误,允许攻击者利用漏洞访问部分受限应用。 5,存在未明错误,允许攻击者利用漏洞获取部分数据。 0 HP Service Manager 9.30 HP Service Manager 9.31 HP Service Manager 9.32 HP Service Manager 9.33 厂商补丁: HP ----- 用户可参考如下厂商提供的安全公告获取补丁以修复该漏洞: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04117626
    idSSV:61553
    last seen2017-11-19
    modified2014-02-25
    published2014-02-25
    reporterRoot
    titleHP Service Manager多个安全漏洞
  • bulletinFamilyexploit
    descriptionCVE ID: CVE-2013-2067 Apache Tomcat是一款开放源码的JSP应用服务器程序 Apache Tomcat表单验证功能中的java/org/apache/catalina/authenticator/FormAuthenticator.java不正确处理验证需求和会话之前的关系,允许远程攻击者ilyong漏洞在完成登录表单过程中对已验证资源发送请求,可把请求注入到会话中,使用目标验证凭据执行该请求。此漏洞是会话固定攻击的一个变种 0 Apache Tomcat 6.0.21 - 6.0.36 Apache Tomcat 7.x 厂商解决方案 Apache Tomcat 7.0.33已经修复此漏洞,建议用户下载更新: http://tomcat.apache.org/
    idSSV:60828
    last seen2017-11-19
    modified2013-06-06
    published2013-06-06
    reporterRoot
    titleApache Tomcat表单验证功能安全绕过漏洞

References