Lucene search

K
nessusTenable800619.PRM
HistoryJan 25, 2009 - 12:00 a.m.

Apache Tomcat < 5.5.29 / 6.0.24

2009-01-2500:00:00
Tenable
www.tenable.com
13

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:P/A:P

0.005 Low

EPSS

Percentile

77.2%

The version of Apache Tomcat installed on the remote host is earlier than 5.5.29, or 6.0.24. Such versions are potentially affected by multiple vulnerabilities :

  • When deploying WAR files, the WAR files are not checked for directory traversal attempts. This allows an attacker to create arbitrary content outside of the web root by including entries such as ‘…/…/bin/catalina.sh’ in the WAR. (CVE-2009-2693)

  • By default, Tomcat automatically deploys any directories placed in a host’s appBase. Depending on circumstances, files normally protected by one or more security constraints may be deployed without those security constraints, making them accessible without authentication. (CVE-2009-2901)

  • When deploying WAR files, the WAR file names are not checked for directory traversal attempts, which could lead to the deletion of arbitrary files in the host’s work directory. (CVE-2009-2902)

Binary data 800619.prm

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:P/A:P

0.005 Low

EPSS

Percentile

77.2%