Lucene search

K
nessusThis script is Copyright (C) 2010-2024 Tenable Network Security, Inc.TOMCAT_WAR_DEPLOY_MULTIPLE_VULNERABILITIES.NASL
HistoryJan 26, 2010 - 12:00 a.m.

Apache Tomcat WAR Deployment Multiple Vulnerabilities

2010-01-2600:00:00
This script is Copyright (C) 2010-2024 Tenable Network Security, Inc.
www.tenable.com
21

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:P/A:P

5.3 Medium

AI Score

Confidence

Low

0.005 Low

EPSS

Percentile

77.2%

According to its self-reported version number, the remote host is running a version of Apache Tomcat that is affected by multiple vulnerabilities :

  • When deploying WAR files, the WAR files are not checked for directory traversal attempts which could allow an attacker to create arbitrary content outside of the web root. (CVE-2009-2693)

  • By default, Tomcat automatically deploys any directories placed in a host’s appBase. This could lead to files which are normally protected by one or more security constraints being deployed without those security constraints. (CVE-2009-2901)

  • When deploying WAR files, the WAR file names are not checked for directory traversal attempts which could allow an attacker to caused the deletion of the current contents of the host’s work directory. (CVE-2009-2902).

Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(44314);
  script_version("1.27");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/05/06");

  script_cve_id("CVE-2009-2693", "CVE-2009-2901", "CVE-2009-2902");
  script_bugtraq_id(37942, 37944, 37945);
  script_xref(name:"SECUNIA", value:"38316");
  script_xref(name:"SECUNIA", value:"38346");

  script_name(english:"Apache Tomcat WAR Deployment Multiple Vulnerabilities");

  script_set_attribute(attribute:"synopsis", value:
"The web server running on the remote host is affected by multiple
vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"According to its self-reported version number, the remote host is
running a version of Apache Tomcat that is affected by multiple
vulnerabilities :

  - When deploying WAR files, the WAR files are not checked
    for directory traversal attempts which could allow an
    attacker to create arbitrary content outside of the web
    root. (CVE-2009-2693)

  - By default, Tomcat automatically deploys any directories
    placed in a host's appBase.  This could lead to files
    which are normally protected by one or more security
    constraints being deployed without those security
    constraints. (CVE-2009-2901)

  - When deploying WAR files, the WAR file names are not
    checked for directory traversal attempts which could
    allow an attacker to caused the deletion of the current
    contents of the host's work directory. (CVE-2009-2902).

Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number.");
  script_set_attribute(attribute:"see_also", value:"http://tomcat.apache.org/security-5.html");
  script_set_attribute(attribute:"see_also", value:"http://tomcat.apache.org/security-6.html");
  script_set_attribute(attribute:"see_also", value:"https://www.securityfocus.com/archive/1/509148/30/0/threaded");
  script_set_attribute(attribute:"see_also", value:"https://www.securityfocus.com/archive/1/509150/30/0/threaded");
  script_set_attribute(attribute:"see_also", value:"https://www.securityfocus.com/archive/1/509151/30/0/threaded");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Tomcat version 6.0.24 / 5.5.29 or later.");
  script_set_attribute(attribute:"agent", value:"all");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2009-2693");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(22, 264);

  script_set_attribute(attribute:"vuln_publication_date", value:"2010/01/25");
  script_set_attribute(attribute:"patch_publication_date", value:"2010/01/25");
  script_set_attribute(attribute:"plugin_publication_date", value:"2010/01/26");

  script_set_attribute(attribute:"plugin_type", value:"combined");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:apache:tomcat:5");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:apache:tomcat:6");
  script_set_attribute(attribute:"thorough_tests", value:"true");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Web Servers");

  script_copyright(english:"This script is Copyright (C) 2010-2024 Tenable Network Security, Inc.");

  script_dependencies("tomcat_error_version.nasl", "tomcat_win_installed.nbin", "apache_tomcat_nix_installed.nbin");
  script_require_keys("installed_sw/Apache Tomcat");

  exit(0);
}

include("tomcat_version.inc");

tomcat_check_version(fixed:make_list("6.0.24", "5.5.29"), severity:SECURITY_WARNING, granularity_regex:"^(6(\.0)?|5(\.5)?)$");
VendorProductVersionCPE
apachetomcat5cpe:/a:apache:tomcat:5
apachetomcat6cpe:/a:apache:tomcat:6

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:P/A:P

5.3 Medium

AI Score

Confidence

Low

0.005 Low

EPSS

Percentile

77.2%