Lucene search

K
nessusTenable5786.PASL
HistoryFeb 11, 2011 - 12:00 a.m.

Apache Tomcat 5.5.x < 5.5.30 Multiple Vulnerabilities

2011-02-1100:00:00
Tenable
www.tenable.com
11

According to its self-reported version number, the Apache Tomcat server listening on the remote host is 5.5.x prior to 5.5.30. It is, therefore, affected by multiple vulnerabilities:

  • An error in the access restriction on a โ€˜ServletContextโ€™ attribute which holds the location of the work directory in Tomcatโ€™s SecurityManager. A remote attacker may be able to modify the location of the working directory which then allows improper read and write access to arbitrary files and directories in the context of Tomcat.(CVE-2010-3718)

  • An error exists in the handling of the โ€˜Transfer-Encodingโ€™ header of a client request. This error affects buffer recycling and may lead to the disclosure of sensitive information or allow a denial of service attack to be successful. (CVE-2010-2227)

  • An error exists in the handling of the โ€˜<realm-name>โ€™ element in a web applicationโ€™s web.xml file. If the element is missing from the web.xml file and the application is using BASIC or DIGEST authentication, Tomcat will include the serverโ€™s hostname or IP address in the โ€˜WWW-Authenticateโ€™ header of the response. (CVE-2010-1157)

Note that Nessus Network Monitor did not actually test for the flaws but instead has relied on the version in Tomcatโ€™s banner or error page so this may be a false positive.

Binary data 5786.pasl
VendorProductVersionCPE
apachetomcatcpe:/a:apache:tomcat