---------------------------------------------------------------------- Proof-of-Concept (PoC) and Extended Analysis available for customers. Get a free trial, contact sales@secunia.com ---------------------------------------------------------------------- TITLE: Apache Tomcat Web Application Manager / Host Manager Cross-Site Request Forgery SECUNIA ADVISORY ID: SA39261 VERIFY ADVISORY: http://secunia.com/advisories/39261/ DESCRIPTION: A vulnerability has been discovered in Apache Tomcat, which can be exploited by malicious people to conduct cross-site request forgery attacks. The Tomcat Web Application Manager and the Host Manager allow users to perform certain actions via HTTP requests without performing any validation checks to verify the requests. This can be exploited to perform administrative actions (e.g. to stop or undeploy an application, or add a virtual host) if a logged-in administrative user visits a malicious web site. The vulnerability is confirmed in version 5.5.28 and 6.0.26. Other versions may also be affected. SOLUTION: Close the browser after an administrative session in the Tomcat Web Application Manager or the Host Manager. Do not browse untrusted web sites or follow untrusted links while being logged-in to the management interface. PROVIDED AND/OR DISCOVERED BY: Reported as enhancement for Tomcat version 7. Reported as vulnerability in version 5.x and 6.x by Swatej Kumar via Secunia. OTHER REFERENCES: http://svn.eu.apache.org/repos/asf/tomcat/trunk/webapps/docs/changelog.xml ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------