The Apache Tomcat team has recently patched several security vulnerabilities in Apache Tomcat, one of which could allow an unauthorized attacker to execute malicious code on affected servers remotely.
Apache Tomcat is an open source web server and servlet system, which uses several Java EE specifications and provides a "pure Java" HTTP web server environment for Java concept to run in.
The critical Remote Code Execution (RCE) vulnerability (CVE-2017-12617) discovered in Apache Tomcat is due to insufficient validation of user-supplied input by the affected software.
Customer data that was compromised during a massive breach of Equifax's systems was not encrypted, the company's ex-CEO told a congressional committee on September 26.
During a three-hour hearing before the House Energy and Commerce Committee, Richard Smith blamed the massive hack on a combination of failed technology and human error.
Equifax’s security team discovered that the attackers had exploited an Apache Struts flaw to access its systems on May 13. The vulnerability in question, CVE-2017-5638, has been exploited in the wild since the first half of March.
Equifax said its team had known about the Struts vulnerability since it was disclosed and it took steps to patch systems. Even if the data were encrypted, however, the application that the hackers exploited would still have had access to it.
Alert Logic’s Michael Farnum and Joe Hitchcock lay out the key elements of effective security for web applications in a SQL-based cloud environment in this 5-part blog series.
*IP addresses provided by Recorded Future.
Want to learn about Alert Logic products in more detail? Call us direct at +1.877.484.8383, for the UK call +44 (0) 203 011 5533, or complete this form. An Alert Logic representative will contact you soon.