Vigil@nce - Apache Tomcat: information disclosure via XML Parser
June 2014 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker, who is allowed to install a web application, can
change the XML parser used by Apache Tomcat, in order to obtain
sensitive information.
Impacted products: Tomcat
Severity: 2/4
Creation date: 27/05/2014
DESCRIPTION OF THE VULNERABILITY
A web application can change the XML parser used by Apache Tomcat,
which leads to two vulnerabilities.
An attacker can use an external XML entity, in order to bypass
file access constraints imposed by the Security Manager.
[severity:2/4]
An attacker can read XML files processed by other web applications
installed on the same Tomcat instance. [severity:2/4]
An attacker, who is allowed to install a web application, can
therefore change the XML parser used by Apache Tomcat, in order to
obtain sensitive information.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Apache-Tomcat-information-disclosure-via-XML-Parser-14809