Vulnerabilidad en Apache Tomcat (CVE-2013-4590)
Gravedad CVSS v2.0:
MEDIA
Tipo:
CWE-200
Revelación de información
Fecha de publicación:
26/02/2014
Última modificación:
11/04/2025
Descripción
Apache Tomcat anterior a 6.0.39, 7.x anterior a 7.0.50 y 8.x anterior a 8.0.0-RC10 permite a atacantes obtener información "Tomcat internals" mediante el aprovechamiento de la presencia de una aplicación web no confiable con un documento context.xml, web.xml, *.jspx, *.tagx, o *.tld XML que contiene una declaración de entidad externa en conjunto con una referencia de entidad, relacionada con un problema XML External Entity (XXE).
Impacto
Puntuación base 2.0
4.30
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:apache:tomcat:8.0.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:8.0.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:8.0.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:8.0.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:8.0.0:rc5:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:8.0.0:rc6:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:8.0.0:rc7:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:8.0.0:rc8:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:8.0.0:rc9:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* | 6.0.37 (incluyendo) | |
| cpe:2.3:a:apache:tomcat:1.1.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:3.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:3.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:3.1.1:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://advisories.mageia.org/MGASA-2014-0148.html
- http://marc.info/?l=bugtraq&m=144498216801440&w=2
- http://secunia.com/advisories/59036
- http://secunia.com/advisories/59722
- http://secunia.com/advisories/59724
- http://secunia.com/advisories/59873
- http://svn.apache.org/viewvc?view=revision&revision=1549528
- http://svn.apache.org/viewvc?view=revision&revision=1549529
- http://svn.apache.org/viewvc?view=revision&revision=1558828
- http://tomcat.apache.org/security-6.html
- http://tomcat.apache.org/security-7.html
- http://tomcat.apache.org/security-8.html
- http://www-01.ibm.com/support/docview.wss?uid=swg21667883
- http://www-01.ibm.com/support/docview.wss?uid=swg21675886
- http://www-01.ibm.com/support/docview.wss?uid=swg21677147
- http://www-01.ibm.com/support/docview.wss?uid=swg21678231
- http://www.debian.org/security/2016/dsa-3530
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A052
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A084
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
- http://www.securityfocus.com/bid/65768
- http://www.vmware.com/security/advisories/VMSA-2014-0008.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1069911
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
- https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
- http://advisories.mageia.org/MGASA-2014-0148.html
- http://marc.info/?l=bugtraq&m=144498216801440&w=2
- http://secunia.com/advisories/59036
- http://secunia.com/advisories/59722
- http://secunia.com/advisories/59724
- http://secunia.com/advisories/59873
- http://svn.apache.org/viewvc?view=revision&revision=1549528
- http://svn.apache.org/viewvc?view=revision&revision=1549529
- http://svn.apache.org/viewvc?view=revision&revision=1558828
- http://tomcat.apache.org/security-6.html
- http://tomcat.apache.org/security-7.html
- http://tomcat.apache.org/security-8.html
- http://www-01.ibm.com/support/docview.wss?uid=swg21667883
- http://www-01.ibm.com/support/docview.wss?uid=swg21675886
- http://www-01.ibm.com/support/docview.wss?uid=swg21677147
- http://www-01.ibm.com/support/docview.wss?uid=swg21678231
- http://www.debian.org/security/2016/dsa-3530
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A052
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A084
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
- http://www.securityfocus.com/bid/65768
- http://www.vmware.com/security/advisories/VMSA-2014-0008.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1069911
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
- https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E



