Security Bulletin
Summary
Some versions of Rational DOORS Web Access are shipped with an Apache Tomcat application server that contains security vulnerabilities. Apache Tomcat has been updated to incorporate fixes for these vulnerabilities.
Vulnerability Details
CVEID: CVE-2018-1305
DESCRIPTION: Apache Tomcat could allow a remote attacker to bypass security restrictions, caused by the failure to properly enforce security constraints that are defined by annotations of Servlets in certain cases. An attacker could exploit this vulnerability to bypass security constraints to access restricted resources.
CVSS Base Score: 7.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/139475 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)
CVEID: CVE-2018-1304
DESCRIPTION: Apache Tomcat could allow a remote attacker to bypass security restrictions, caused by the failure to properly enforce security constraint definitions that contain a URL pattern of "" (the empty string) that exactly maps to the context root. An attacker could exploit this vulnerability to bypass security constraints to access restricted resources.
CVSS Base Score: 7.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/139476 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)
Affected Products and Versions
Rational DOORS Web Access: 9.5.1 - 9.5.1.9
Rational DOORS Web Access: 9.5.2 - 9.5.2.8
Rational DOORS Web Access: 9.6.0 - 9.6.0.7
Rational DOORS Web Access: 9.6.1 - 9.6.1.10
Remediation/Fixes
Upgrade to the version of Apache Tomcat shown in the table below. You can upgrade Apache Tomcat after installing Rational DOORS Web Access.
The following table presents Rational DOORS Web Access versions and the released versions of Apache Tomcat.
| Rational DOORS Web Access | Apache Tomcat |
| 9.5.1 - 9.5.1.9 | 7.0.85 |
| 9.5.2 - 9.5.2.8 | 7.0.85 |
| 9.6.0 - 9.6.0.7 | 7.0.85 |
| 9.6.1 - 9.6.1.10 | 7.0.85 |
Procedure:
- Download the required version of Apache Tomcat or later core zip file from the Apache or Tomcat 7 Archive download site. For example:
apache-tomcat-7.0.85-windows-x64.zip
apache-tomcat-7.0.85-windows-x86.zip
apache-tomcat-7.0.85.tar.gz
- Go to the Rational DOORS Web Access installation directory.
For example:
C:\Program Files\IBM\Rational\DOORS Web Access\9.version
- Rename the server directory to server.orig.
- Extract the downloaded Apache Tomcat core compressed file to ./server in the Rational DOORS Web Access installation directory.
- Delete the contents of the ./server/webapps folder
- Copy the following jar files from your ./server.orig/lib directory to ./server/lib
commons-logging-1.1.x.jar
dwa-catalina.jar
log4j-1.2.x.jar
log4j.properties
- Remove the following jar files from the ./server/lib directory
tomcat7-websocket.jar
websocket-api.jar
- Copy your ./server.orig/festival directory to ./server/festival.
- Copy the ./server.orig/conf/server.xml file to ./server/conf/server.xml.
- Copy ./server.orig/webapps/*.war to ./server/webapps.
- Optional: Copy any customized files from the ./server.orig directory to ./server.
- UNIX systems only: Run the ./configure-festival.sh command, as described in the help topic Installing the web access server and the web access broker on Linux or Solaris systems.
Workarounds and Mitigations
None
Get Notified about Future Security Bulletins
References
Acknowledgement
None
Change History
19 June 2018: Original copy published
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Was this topic helpful?
Document Information
Modified date:
21 June 2018
UID
swg22017328