KB Article #182397

SECURITY: Apache Tomcat invalid Authentication Session Cookie Exposure

Problem

When sending an invalid cookie to the AdminUI, the contents of the cookie will be logged in $FILEDRIVEHOME/tomcat/admin/logs/catalina.out.


In general, not logging invalid inputs is considered a security risk when the attack vector is not clearly described and logs can help detect and investigate malicious activity. However, if your Security Team requests the cookie contents not be logged, you can suppress it as shown in this article.


Resolution

WARNING: The described edits must be redone after every Update applied to SecureTransport.


For Linux

Go to the $FILEDRIVEHOME/conf folder


Unzip the LocalStrings.properties file by executing the below command (mind that there are multiple files with the same name and you should follow the exact instructions):


unzip ../tomcat/lib/tomcat-coyote.jar org/apache/tomcat/util/http/parser/LocalStrings.properties


Modify the value on the line starting with cookie.invalidCookieValue and remove the [{0}] from the text. The final form should look like this:


A cookie header was received that contained an invalid cookie. That cookie will be ignored.


Restart the Admin service.


For Windows

You will have to extract the LocalStrings.properties file with an archiving software and place it under $FILEDRIVEHOME\conf\org\apache\tomcat\util\http\parser. This folder will have to be created manually beforehand.


After that, follow the modification steps for Linux as described above.