Lucene search

K

Apache Tomcat 5.5.x < 5.5.30

🗓️ 16 Jul 2010 00:00:00Reported by This script is Copyright (C) 2010-2024 Tenable Network Security, Inc.Type 
nessus
 nessus
🔗 www.tenable.com👁 40 Views

Apache Tomcat 5.5.x < 5.5.30 vulnerabilitie

Show more
Related
Refs
Code
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(47749);
  script_version("1.37");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/05/06");

  script_cve_id("CVE-2010-1157", "CVE-2010-2227", "CVE-2010-3718");
  script_bugtraq_id(39635, 41544, 46177);
  script_xref(name:"SECUNIA", value:"39574");
  script_xref(name:"SECUNIA", value:"43198");

  script_name(english:"Apache Tomcat 5.5.x < 5.5.30");

  script_set_attribute(attribute:"synopsis", value:
"The remote Apache Tomcat server is affected by multiple
vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"According to its self-reported version number, the Apache Tomcat
server listening on the remote host is 5.5.x prior to 5.5.30. It is,
therefore, affected by multiple vulnerabilities :

  - An error in the access restriction on a 'ServletContext'
    attribute which holds the location of the work
    directory in Tomcat's SecurityManager. A remote attacker
    may be able to modify the location of the working
    directory which then allows improper read and write
    access to arbitrary files and directories in the context
    of Tomcat.(CVE-2010-3718)

  - An error exists in the handling of the
    'Transfer-Encoding' header of a client request. This
    error affects buffer recycling and may lead to the
    disclosure of sensitive information or allow a denial
    of service attack to be successful. (CVE-2010-2227)

  - An error exists in the handling of the '<realm-name>'
    element in a web application's web.xml file. If the
    element is missing from the web.xml file and the
    application is using BASIC or DIGEST authentication,
    Tomcat will include the server's hostname or IP address
    in the 'WWW-Authenticate' header of the response.
    (CVE-2010-1157)

Note that Nessus did not actually test for the flaws but instead has
relied on the version in Tomcat's banner or error page so this may be
a false positive.");
  script_set_attribute(attribute:"see_also", value:"http://tomcat.apache.org/security-5.html#Fixed_in_Apache_Tomcat_5.5.30");
  script_set_attribute(attribute:"see_also", value:"http://seclists.org/bugtraq/2010/Apr/200");
  # http://old.nabble.com/How-to-reproduce-tomcat-security-vulnerabilities-td29775490.html
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?809a4670");
  script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2011/Feb/74");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Tomcat version 5.5.30 or later.");
  script_set_attribute(attribute:"agent", value:"all");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2010-2227");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2010/07/09");
  script_set_attribute(attribute:"patch_publication_date", value:"2010/07/09");
  script_set_attribute(attribute:"plugin_publication_date", value:"2010/07/16");

  script_set_attribute(attribute:"plugin_type", value:"combined");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:apache:tomcat:5");
  script_set_attribute(attribute:"thorough_tests", value:"true");
  script_end_attributes();

  script_category(ACT_ATTACK);
  script_family(english:"Web Servers");

  script_copyright(english:"This script is Copyright (C) 2010-2024 Tenable Network Security, Inc.");

  script_dependencies("tomcat_error_version.nasl", "tomcat_win_installed.nbin", "apache_tomcat_nix_installed.nbin");
  script_require_keys("installed_sw/Apache Tomcat");

  exit(0);
}

include("tomcat_version.inc");

tomcat_check_version(fixed:"5.5.30", min:"5.5.0", severity:SECURITY_WARNING, granularity_regex:"^5(\.5)?$");

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
16 Jul 2010 00:00Current
6Medium risk
Vulners AI Score6
CVSS26.4
EPSS0.689
40
.json
Report