Bug 1480618 (CVE-2017-7674)

Summary: CVE-2017-7674 tomcat: Vary header not added by CORS filter leading to cache poisoning
Product: [Other] Security Response Reporter: Adam Mariš <amaris>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: aileenc, A.J.Caines+RedHat, alee, bmaxwell, ccoleman, cdewolf, chazlett, coolsvap, csutherl, darran.lofthouse, dedgar, dimitris, dmcphers, dosoudil, fgavrilo, gvarsami, gzaronik, hhorak, ivan.afonichev, java-sig-commits, jawilson, jclere, jcoleman, jdoyle, jgoulding, jolee, jondruse, jorton, jshepherd, kconner, krzysztof.daniel, ldimaggi, lgao, loleary, mbabacek, mizdebsk, myarboro, nwallace, pgier, pjurak, ppalaga, psakar, pslavice, rnetuka, rstancel, rsvoboda, rwagner, slukasik, spinder, tcunning, theute, tkirby, twalsh, vhalbert, vtunka, weli, yozone
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: tomcat 7.0.79, tomcat 8.0.45, tomcat 8.5.16 Doc Type: If docs needed, set a value
Doc Text:
A vulnerability was discovered in Tomcat where the CORS Filter did not send a "Vary: Origin" HTTP header. This potentially allowed sensitive data to be leaked to other visitors through both client-side and server-side caches.
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-08 03:20:29 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1480619, 1480620, 1480621, 1495654, 1495655    
Bug Blocks: 1480628    

Description Adam Mariš 2017-08-11 13:58:56 UTC
The CORS Filter did not add an HTTP Vary header indicating that the response varies depending on Origin. This permitted client and server side cache poisoning in some circumstances.

Affected versions: 7.0.41 to 7.0.78, 8.0.0.RC1 to 8.0.44, 8.5.0 to 8.5.15

Upstream patches:

Tomcat 7: https://svn.apache.org/viewvc?view=revision&revision=1795816
Tomcat 8.0.x: https://svn.apache.org/viewvc?view=revision&revision=1795815
Tomcat 8.5.x: https://svn.apache.org/viewvc?view=revision&revision=1795814

External References:

https://tomcat.apache.org/security-7.html
https://tomcat.apache.org/security-8.html

Comment 1 Adam Mariš 2017-08-11 14:00:32 UTC
Created jbossweb tracking bugs for this issue:

Affects: openshift-1 [bug 1480619]


Created tomcat tracking bugs for this issue:

Affects: epel-6 [bug 1480621]
Affects: fedora-all [bug 1480620]

Comment 3 Jason Shepherd 2017-08-22 01:46:40 UTC
EAP 6 doesn't not contain the vulnerable CORSFilter. Any products based on EAP 6 would not be affected, unless they add the CORSFilter in their layered code.

Marking JON-3 as NOTAFFECTED

Comment 5 errata-xmlrpc 2017-10-30 00:28:39 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2017:3081 https://access.redhat.com/errata/RHSA-2017:3081