Bug 1311085 (CVE-2015-5346)

Summary: CVE-2015-5346 tomcat: Session fixation
Product: [Other] Security Response Reporter: Timothy Walsh <twalsh>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: aileenc, alazarot, alee, asantos, bbaranow, bdawidow, bmaxwell, brms-jira, ccoleman, cdewolf, chazlett, coolsvap, csutherl, dandread, darran.lofthouse, dknox, dmcphers, epp-bugs, etirelli, fnasser, gvarsami, huwang, ivan.afonichev, jason.greene, java-sig-commits, jawilson, jboss-set, jbpapp-maint, jclere, jcoleman, jdg-bugs, jdoyle, jialiu, joelsmith, jokerman, jpallich, jshepherd, kconner, krzysztof.daniel, ldimaggi, lgao, lmeyer, lpetrovi, mbabacek, mbaluch, miburman, mmccomas, mpoole, mweiler, mwinkler, myarboro, nwallace, pcheung, pgier, psakar, pslavice, rnetuka, rrajasek, rsvoboda, rwagner, rzhang, soa-p-jira, spinder, tcunning, theute, tkirby, ttarrant, twalsh, vtunka, weli, yozone
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: tomcat 7.0.67, tomcat 8.0.32 Doc Type: Bug Fix
Doc Text:
A session fixation flaw was found in the way Tomcat recycled the requestedSessionSSL field. If at least one web application was configured to use the SSL session ID as the HTTP session ID, an attacker could reuse a previously used session ID for further requests.
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-08 02:48:37 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1311095, 1311102, 1316022, 1316023, 1322794, 1322795, 1347138, 1347139, 1352009, 1381946    
Bug Blocks: 1311109, 1318206, 1382592    

Description Timothy Walsh 2016-02-23 11:01:42 UTC
When recycling the Request object to use for a new request, the requestedSessionSSL field was not recycled. This meant that a session ID provided in the next request to be processed using the recycled Request object could be used when it should not have been. This gave the client the ability to control the session ID. In theory, this could have been used as part of a session fixation attack but it would have been hard to achieve as the attacker would not have been able to force the victim to use the 'correct' Request object. It was also necessary for at least one web application to be configured to use the SSL session ID as the HTTP session ID. This is not a common configuration.

Comment 1 Andrej Nemec 2016-02-23 11:35:17 UTC
External references:

http://seclists.org/bugtraq/2016/Feb/143

Comment 6 errata-xmlrpc 2016-05-17 16:15:29 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Web Server 3.0.3

Via RHSA-2016:1089 https://rhn.redhat.com/errata/RHSA-2016-1089.html

Comment 7 errata-xmlrpc 2016-05-17 16:32:16 UTC
This issue has been addressed in the following products:

  JWS 3.0 for RHEL 7

Via RHSA-2016:1088 https://access.redhat.com/errata/RHSA-2016:1088

Comment 8 errata-xmlrpc 2016-05-17 16:33:32 UTC
This issue has been addressed in the following products:

  JWS 3.0 for RHEL 6

Via RHSA-2016:1087 https://access.redhat.com/errata/RHSA-2016:1087

Comment 12 Fedora Update System 2016-09-01 16:19:08 UTC
tomcat-7.0.70-2.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report.

Comment 13 Fedora Update System 2016-09-02 09:21:02 UTC
tomcat-7.0.70-2.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report.

Comment 16 errata-xmlrpc 2016-10-10 20:39:57 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2016:2046 https://rhn.redhat.com/errata/RHSA-2016-2046.html

Comment 17 errata-xmlrpc 2016-11-17 20:34:01 UTC
This issue has been addressed in the following products:



Via RHSA-2016:2808 https://rhn.redhat.com/errata/RHSA-2016-2808.html

Comment 18 errata-xmlrpc 2016-11-17 20:37:47 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Web Server 2 for RHEL 6
  Red Hat JBoss Enterprise Web Server 2 for RHEL 7

Via RHSA-2016:2807 https://rhn.redhat.com/errata/RHSA-2016-2807.html