Check Point Advisories

Apache Tomcat Server Malicious Request Information Disclosure (CVE-2002-2006; CVE-2002-2007; CVE-2002-2008)

Check Point Reference: CPAI-2014-1159
Date Published: 17 Mar 2014
Severity: Medium
Last Updated: Monday 17 March, 2014
Source: CVE-2002-2006
CVE-2002-2007
CVE-2002-2008
Protection Provided by:

Security Gateway
R75 and above

Who is Vulnerable?
Apache Software Foundation Tomcat 4.x
Apache Software Foundation Tomcat 3.x
Vulnerability Description An Information disclosure vulnerability has been reported in Apache Tomcat servers. The vulnerability is due to an error in the way Apache Tomcat handles specially crafted page requests. A remote attacker can exploit this vulnerability by sending crafted requests which will result in Apache Tomcat returning an error page containing information that includes the absolute path to the server's web root and possibly a directory listing. This protection was previously known as Apache Tomcat Path Disclosure, Apache Tomcat RealPath and Apache Tomcat Malicious Request.

Protection Overview

This protection will detect and block attempts to exploit this vulnerability.

In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, Protection tab and select the version of your choice.

Security Gateway R70 / R71 / R75 and above

  1. In the IPS tab, click Protections and find the Apache Tomcat Server Malicious Request Information Disclosure protection using the Search tool and Edit the protection's settings.
  2. Install policy on all modules.

SmartView Tracker will log the following entries:

Attack Name:  Apache Server Protection Violation.
Attack Information:  Apache Tomcat Server Malicious Request Information Disclosure

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK