Home » Enterprise Java » Tomcat » Apache Tomcat Vulnerabilities Example

About Mary Zheng

Mary has graduated from Mechanical Engineering department at ShangHai JiaoTong University. She also holds a Master degree in Computer Science from Webster University. During her studies she has been involved with a large number of projects ranging from programming and software engineering. She works as a senior Software Engineer in the telecommunications sector where she acts as a leader and works with others to design, implement, and monitor the software solution.

Apache Tomcat Vulnerabilities Example

Apache Tomcat (Tomcat) is a widely used Java application server with over one million downloads per month. Most vulnerabilities of Tomcat are discovered by the Tomcat community or security researchers, and are quickly patched. Tomcat security is a matter of balancing convenience and restrictions. In this tutorial, we will provide an overview of the security vulnerabilities in Tomcat.
 
 
 
 
 
 

1. Introduction

Apache Tomcat is an open source Java Servlet container developed by the Apache Software Foundation. It is written in Java and available under the Apache Software License.

A vulnerability is a flaw in code or design that creates a security risk. Vulnerabilities create possible attack vectors, through which intruders can hack the system.

All of Tomcat’s known security vulnerabilities as well as fixed versions are available here. Most weaknesses of Tomcat actually come from incorrect configuration. In this example, I will show you how to secure Tomcat by adjusting the server.xml and web.xml configurations.

2. Technologies Used

The example code in this article was built and run using:

  • Java 1.8
  • Tomcat 9.0.6 and 8.0.12
  • Fiddler 2

3. Installation

To install Tomcat 9 on a Windows 7 system, follow these instructions. Make sure you already have JDK 8 installed.

Check the installed Tomcat webapps directory. It includes five sub-folders: docs, examples, host-manager, manager, and ROOT.

4. Tomcat Server with the Default Setting

Start Tomcat with the default setting. In this step, I will demonstrate two security vulnerabilities caused by the default setting.

  1. Go to the Tomcat 9 bin directory. Execute startup.bat to start the server.
  2. Confirm that the server is up by checking the server output.Tomcat Server Output
    16-Mar-2018 16:41:10.232 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deployment of web application directory [C:\MaryZheng\tools\apache-tomcat-9.0.6\webapps\manager] has finished in [120] ms
    16-Mar-2018 16:41:10.233 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deploying web application directory [C:\MaryZheng\tools\apache-tomcat-9.0.6\webapps\ROOT]
    16-Mar-2018 16:41:10.322 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deployment of web application directory [C:\MaryZheng\tools\apache-tomcat-9.0.6\webapps\ROOT] has finished in [88] ms
    16-Mar-2018 16:41:10.328 INFO [main] org.apache.coyote.AbstractProtocol.start Starting ProtocolHandler ["http-nio-8080"]
    16-Mar-2018 16:41:10.350 INFO [main] org.apache.coyote.AbstractProtocol.start Starting ProtocolHandler ["ajp-nio-8009"]
    16-Mar-2018 16:41:10.356 INFO [main] org.apache.catalina.startup.Catalina.start Server startup in 3234 ms
  3. Start the Fiddler. Click here to install it.
  4. Open a web browser window and go to http://localhost:8080.
  5. You should see a web page with Tomcat server information.
    Apache Tomcat Vulnerabilities - Default Home Page

    Figure 1 Default Home Page

  6. Switch to the Fiddler application. Click on the Inspectors tab, then the Headers tab. The Tomcat 9.0.6 hides the sever information, but Tomcat 8.0.12 shows the server information.
  7. Switch to your web browser, and then go to http://localhost:8080/bad. You should see the 404 – Not found error page, which displays the server information.
    Apache Tomcat Vulnerabilities - Default Error Page

    Figure 2 Default Error Page

Displaying the server and version details are two common security vulnerabilities. I will show you how to adjust the server.xml to hide them.

5. Remove the Default Web Applications

We should remove everything from webapps because it presents security risks according to Apache documentation. It can be useful to keep the manager web application installed if you need to auto-deploy the application without restarting Tomcat. If you do, please follow the instruction here.
We will demonstrate a security risk with the steps below:

  1. Start the Tomcat server with manager web application
  2. Start the Fiddler application
  3. Navigate to http://localhost:8080/manager/html
  4. Enter the login, for example, I enter the username as hacker, password as trytohackyou
  5. Capture the Http header and you will see the Authorization displays as a clear text.
  6. Navigate to https://www.base64decode.org/; Decode the clear text value, then you get the username and password.
Apache Tomcat Vulnerabilities - Default login data

Figure 3 Default login data

Apache Tomcat Vulnerabilities - Decode login data

Figure 4 Decode login data

6. Server.xml

The server.xml file is a deployment descriptor which is used to specify server configurations. We will modify it for better security using the steps below:

  1. Delete all default comments
  2. Hide the server from the http header
  3. Disable the displaying of server version details
  4. Disable auto-deploy for production servers
  5. Disable the shutdown port to protect the server from unintended shutdowns

Note: Tomcat 9.0.6 already hides number 2, but 8.0.12 does not. You can hide it by altering the Connector to add the server attribute to some dummy name.

Connector

<Connector port="8080" ... server="SOMEDUMMY" />

Updated server.xml below:

server.xml

<?xml version="1.0" encoding="UTF-8"?>

<Server port="-1" shutdown="SHUTDOWN">
	<Listener className="org.apache.catalina.startup.VersionLoggerListener" />

	<Listener className="org.apache.catalina.core.AprLifecycleListener"
		SSLEngine="on" />

	<Listener className="org.apache.catalina.core.JreMemoryLeakPreventionListener" />
	<Listener className="org.apache.catalina.mbeans.GlobalResourcesLifecycleListener" />
	<Listener className="org.apache.catalina.core.ThreadLocalLeakPreventionListener" />

	<GlobalNamingResources>
		<Resource name="UserDatabase" auth="Container"
			type="org.apache.catalina.UserDatabase" description="User database that can be updated and saved"
			factory="org.apache.catalina.users.MemoryUserDatabaseFactory"
			pathname="conf/tomcat-users.xml" />
	</GlobalNamingResources>

	<Service name="Catalina">
		<Connector port="8080" protocol="HTTP/1.1"
			connectionTimeout="20000" redirectPort="8443" />
		<Connector port="8009" protocol="AJP/1.3" redirectPort="8443" />
		<Engine name="Catalina" defaultHost="localhost">
			<Realm className="org.apache.catalina.realm.LockOutRealm">
				<Realm className="org.apache.catalina.realm.UserDatabaseRealm"
					resourceName="UserDatabase" />
			</Realm>

			<Host name="localhost" appBase="webapps" unpackWARs="true"
				autoDeploy="false">

				<Valve className="org.apache.catalina.valves.AccessLogValve"
					directory="logs" prefix="localhost_access_log" suffix=".txt"
					pattern="%h %l %u %t "%r" %s %b" />
					
				<Valve className="org.apache.catalina.valves.ErrorReportValve"
					showReport="false"
					showServerInfo="false"/>

			</Host>
		</Engine>
	</Service>
</Server>
  • line 3: disable shutdown port
  • line 31: disable auto-deploy
  • line 37-39: disable error page to show the server information

Now, start Tomcat and repeat step 4. You will see that the Tomcat server and version information is now hidden.

Apache Tomcat Vulnerabilities - Secured Tomcat

Figure 5 Secured Tomcat

Apache Tomcat Vulnerabilities - Secured Error Page

Figure 6 Secured Error Page

7. Web.xml

The web.xml is a deployment descriptor file which describes how to deploy a web application in Tomcat. Tomcat has already addressed the vulnerability designated as CVE-2017-12617 on October 3, 2017 by setting the readonly initialization parameter of the DefaultServlet to true.

Here is the default setting for DefaultServlet in web.xml.

DefaultServlet

<servlet>
<servlet-name>default</servlet-name>
<servlet-class>org.apache.catalina.servlets.DefaultServlet</servlet-class>
<init-param>
<param-name>debug</param-name>
<param-value>0</param-value>
</init-param>
<init-param>
<param-name>listings</param-name>
<param-value>false</param-value>
</init-param>
<load-on-startup>1</load-on-startup>
</servlet>

We need update it to include readOnly = true.

readOnly = true

<init-param>
    <param-name>readonly</param-name>
    <param-value>true</param-value>
</init-param>

8. Apache Tomcat Vulnerabilities – Summary

In this example, we manually use the Fiddler web application to find two known vulnerabilities. Then we demonstrated how to update the server.xml to prevent them.

Tomcat is managed by the operating system and hosts web applications. Clients access it via the network. So we should secure the network, operating systems, as well as the web applications hosted at Tomcat Server.

We should also use scanning tools to test the web application vulnerability. There are a number of well-respected scanning tools available. e.g. IBM Rational AppScan and Acunetix Web Vulnerability Scanner.

Tomcat is an active open source project, the easiest way to improve the security of your instance is to keep your version up to date and keep up with the Tomcat mailing lists. The CIS Tomcat Security Benchmark includes a long list of other best practices you should consider implementing once you have completed the basic due diligence on your system.

9. Reference

Do you want to know how to develop your skillset to become a Java Rockstar?

Subscribe to our newsletter to start Rocking right now!

To get you started we give you our best selling eBooks for FREE!

 

1. JPA Mini Book

2. JVM Troubleshooting Guide

3. JUnit Tutorial for Unit Testing

4. Java Annotations Tutorial

5. Java Interview Questions

6. Spring Interview Questions

7. Android UI Design

 

and many more ....

 

Receive Java & Developer job alerts in your Area

I have read and agree to the terms & conditions

 

Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Inline Feedbacks
View all comments