IBM Support

Security bulletin: Rational Directory Server (Tivoli) is affected by an Apache Tomcat vulnerability (CVE-2015-5174)

Security Bulletin


Summary

The Apache Tomcat application server in installations of IBM Rational Directory Server (Tivoli) contains a security vulnerability (CVE-2015-5174).

Vulnerability Details

A version of Rational Directory Server (Tivoli) is shipped with an Apache Tomcat application server that contains a security vulnerability. Apache Tomcat has been updated to incorporate a fix for this vulnerability.

Rational Directory Server (Tivoli) is affected by the following vulnerability:

CVEID: CVE-2015-5174
DESCRIPTION:
Apache Tomcat could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) in the getResource(), getResourceAsStream() and getResourcePaths() ServletContext methods to obtain a directory listing for the directory.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/110860 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

Affected Products and Versions

Rational Directory Server (Tivoli) version 5.2.0.2

Remediation/Fixes

You can upgrade Apache Tomcat in an existing installation of Rational Directory Server. An upgrade of Rational Directory Server is not required for this fix.

To obtain the updated version of the Apache Tomcat, contact IBM Support.


 
The following table presents Rational Directory Server versions and the released versions of Apache Tomcat.

Affected version of Rational Directory ServerRecommended upgrade of Apache Tomcat
RDS 5.2.0.26.0.45

 
Support can help identify the latest Apache Tomcat that is compatible with your operating system and platform. Publicly available versions of the Apache Tomcat are not supported with Rational Directory Server.

After you obtain the Apache Tomcat update from Support do these steps:
 
Procedure:
  1. Go to the Rational Directory Server installation directory. 
    For example: C:\Program Files\IBM\Rational\RDS_5.2.0.2
  2. Locate the Start_RDAWebServer.bat and change the path to new Tomcat version.
    For Windows example: “C:\Program Files\IBM\Rational\RDS_5.2.0.2\webAccessServer\apache-tomcat-6.0.45\bin”
    For Linux example : “/var/IBM/Rational?RDS_5.2.0.2/WebAccessServer/apache-tomcat-6.0.45”
  3. Copy ./<old_tomcat>/webapps/*.war to ./<new tomcat>/webapps.
  4. Copy the following files from <old_tomcat>/bin to <new tomcat>/bin:
    • GroupSchema.xsd
    • tdsbuild.property
    • TDSConfiguration.xml
    • TDSResource_en_US.xml
    • UserSchema.xsd
  5. Copy the JRE path from <old_tomcat>/bin/catalina.bat to <new_tomcat>/bin/catalina.bat.
    For Linux update the JRE path in <new_tomcat>/bin/catalina.sh from <old_tomcat>/bin/catalina.sh.
  6. For Linux Only: Go to the <new_tomcat>/bin and execute the command chmod +x *.sh in terminal.
 
 

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

Off

Acknowledgement

None

Change History

*10 May 2016: Original copy published

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

[{"Product":{"code":"SS4AKG","label":"Rational Directory Server"},"Business Unit":{"code":"BU004","label":"Hybrid Cloud"},"Component":"General Information","Platform":[{"code":"PF016","label":"Linux"},{"code":"PF033","label":"Windows"}],"Version":"5.2.0.2","Edition":""}]

Document Information

Modified date:
17 June 2018

UID

swg21981632