McAfee Vulnerability Scan Report shows vulnerablities related to tomcat
1, Apache Tomcat Chunked Request Handling Vulnerability [FID 17880]
2, TLS/SSL RC4 Cipher Suites Information Disclosure Vulnerability [FID 18179]
3, Apache Tomcat Response Request Body Denial of Service [FID 18355]
4, Apache Tomcat Security Manager Bypass [FID 18384]
Please guide/suggest me how i can resolve above vulnerabilities, do i need to upgrade Tomcat if yes then to which version i need to upgrade as currently i have the tomcat which comes with the CLM 5.0.2 as a bundled. need your help over this urgently .
One answer
- Stop the CLM application server ( tomcat )
- copy or move the tomcat/conf/server.xml, your certificate file and the tomcat/webapps directory to a location "above" the tomcat directory
- unpack the downloaded tomcat package in the <jazz_install>/server/ directory. I think it will create a directory with apache-tomcat-Vers as the name. Rename the old tomcat directory, then rename the new directory tomcat
- Move replace the tomcat/conf/server.xml with the one you saved, also move the certificate file to its original location. Also put the webapps dir back under tomcat directory
Comments
Dear Kevin Ramer,
To upgrade the Tomcat server, follow the steps in this technote.
http://www-01.ibm.com/support/docview.wss?uid=swg21687641
To exclude/delete the undesired ciphers, simple remove them in the server.xml file from the line similar to this one.
ciphers="SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA" />You need to remove the ones with "RC4" in the name.
Dear Both Kevin Ramer & Donald Nong
We had a Appscan over the machine where we have deployed CLM and after running scan following are the vulnerabilities:
1, Browser Exploit Against SSL/TLS (a.k.a. BEAST) 1
2, Factoring RSA Export Keys (a.k.a. FREAK) 1
3, Inadequate Account Lockout 1
4, Missing Secure Attribute in Encrypted Session (SSL) Cookie 1
5, RC4 cipher suites were detected 1
6, Session Identifier Not Updated 1
7, Weak SSL Cipher Suites are Supported
Can you guys have any knowledge about how we can fix these vulnerabilities ?
These are almost the same vulnerabilities detected by McAfee and you should follow Kevin 's suggestions above. You should make yourself more familiar with security concepts to better handle such situation. For example, you should recognize that vulnerabilities are mainly concerning Tomcat. The below articles should be a good start.
https://tomcat.apache.org/tomcat-7.0-doc/security-howto.html
https://www.owasp.org/index.php/Securing_tomcat
https://www.mulesoft.com/tcat/tomcat-security
http://geekflare.com/apache-tomcat-hardening-and-security-guide/