Lucene search

K
nessusTenable5789.PASL
HistoryFeb 11, 2011 - 12:00 a.m.

Apache Tomcat 6.0.x < 6.0.30 Multiple Vulnerabilities

2011-02-1100:00:00
Tenable
www.tenable.com
6

According to its self-reported version number, the instance of Apache Tomcat 6.0.x listening on the remote host is prior to 6.0.30. It is, therefore, affected by multiple vulnerabilities:

  • An error in the access restriction on a ‘ServletContext’ attribute that holds the location of the work directory in Tomcat’s SecurityManager. A malicious web application can modify the location of the working directory which then allows improper read and write access to arbitrary files and directories in the context of Tomcat. (CVE-2010-3718)

  • An input validation error exists in the Manager application in that it fails to filter the ‘sort’ and ‘orderBy’ input parameters. (CVE-2010-4172)

  • The default configuration does not include the HTTPOnly flag in a Set-Cookie header, which makes it easier for remote attackers to hijack a session via script access to a cookie. (CVE-2010-4312)

  • An input validation error exists in the HTML manager application in that it fails to filter various input data before returning it to the browser. (CVE-2011-0013)

Note that Nessus Network Monitor has not tested for these issues but has instead relied only on the application’s self-reported version number.

Binary data 5789.pasl
VendorProductVersionCPE
apachetomcatcpe:/a:apache:tomcat