CVE-2019-17563

7.5 HIGH

📋 TL;DR

This CVE describes a session fixation vulnerability in Apache Tomcat's FORM authentication mechanism. An attacker could potentially hijack user sessions during a narrow timing window, though exploitation is considered impractical. Affected systems include Apache Tomcat versions 9.0.0.M1 to 9.0.29, 8.5.0 to 8.5.49, and 7.0.0 to 7.0.98.

💻 Affected Systems

Products:
  • Apache Tomcat
Versions: 9.0.0.M1 to 9.0.29, 8.5.0 to 8.5.49, 7.0.0 to 7.0.98
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using FORM authentication. Other authentication mechanisms are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could hijack authenticated user sessions, potentially gaining unauthorized access to sensitive data or performing actions as the victim user.

🟠

Likely Case

Minimal impact due to the narrow exploitation window making successful attacks improbable in most real-world scenarios.

🟢

If Mitigated

No impact if proper session management controls are in place or if FORM authentication is not used.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires precise timing during FORM authentication and is considered impractical by the vendor.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Tomcat 9.0.30, 8.5.50, 7.0.99

Vendor Advisory: https://lists.apache.org/thread.html/8b4c1db8300117b28a0f3f743c0b9e3f964687a690cdf9662a884bbd%40%3Cannounce.tomcat.apache.org%3E

Restart Required: Yes

Instructions:

1. Download patched version from Apache Tomcat website. 2. Stop Tomcat service. 3. Backup configuration files. 4. Replace Tomcat installation with patched version. 5. Restore configuration files. 6. Start Tomcat service.

🔧 Temporary Workarounds

Disable FORM Authentication

all

Switch to alternative authentication mechanisms like BASIC, DIGEST, or CLIENT-CERT authentication.

Modify web.xml to use different authentication method

🧯 If You Can't Patch

  • Implement additional session validation controls in applications
  • Monitor for unusual session activity patterns

🔍 How to Verify

Check if Vulnerable:

Check Tomcat version and verify if FORM authentication is configured in web.xml

Check Version:

catalina.sh version (Linux) or catalina.bat version (Windows)

Verify Fix Applied:

Verify Tomcat version is 9.0.30+, 8.5.50+, or 7.0.99+

📡 Detection & Monitoring

Log Indicators:

  • Multiple session creations for same user in rapid succession
  • Unusual session ID patterns

Network Indicators:

  • Multiple authentication requests from same source in short timeframe

SIEM Query:

source="tomcat" AND (event="SESSION_CREATED" OR event="AUTHENTICATION") | stats count by src_ip, user

🔗 References

📤 Share & Export