The remote Apache Tomcat Server is vulnerable to cross script scripting and path disclosure issues, including the 'TroubleShooter' servlet
Reporter | Title | Published | Views | Family All 10 |
---|---|---|---|---|
![]() | Apache Tomcat Default Installation Reveals Sensitive Information | 30 Apr 202218:22 | – | osv |
![]() | Apache Tomcat TroubleShooter Servlet Information Disclosure | 15 Jul 200200:00 | – | nessus |
![]() | Apache Tomcat 4.x < 4.1.0 Multiple Vulnerabilities | 4 Nov 201000:00 | – | nessus |
![]() | Apache Tomcat Default Installation Reveals Sensitive Information | 30 Apr 202218:22 | – | github |
![]() | CVE-2002-2006 | 14 Jul 200504:00 | – | cvelist |
![]() | CVE-2002-2006 | 14 Jul 200504:00 | – | cve |
![]() | CVE-2002-2006 | 31 Dec 200205:00 | – | nvd |
![]() | Fixed in Apache Tomcat 4.1.0 | 14 Jul 200500:00 | – | tomcat |
![]() | Fixed in Apache Tomcat 3.3a | 19 Sep 200000:00 | – | tomcat |
![]() | Apache Tomcat Server Malicious Request Information Disclosure (CVE-2002-2006; CVE-2002-2007; CVE-2002-2008) | 17 Mar 201400:00 | – | checkpoint_advisories |
Source | Link |
---|---|
securityfocus | www.securityfocus.com/bid/4575 |
# SPDX-FileCopyrightText: 2002 Matt Moore
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
CPE = "cpe:/a:apache:tomcat";
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.11046");
script_version("2023-08-01T13:29:10+0000");
script_tag(name:"last_modification", value:"2023-08-01 13:29:10 +0000 (Tue, 01 Aug 2023)");
script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
script_tag(name:"cvss_base", value:"5.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:N/A:N");
script_cve_id("CVE-2002-2006");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/4575");
script_name("Apache Tomcat TroubleShooter Servlet Installed");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2002 Matt Moore");
script_family("Web application abuses");
script_dependencies("gb_apache_tomcat_consolidation.nasl");
script_require_ports("Services/www", 8080);
script_mandatory_keys("apache/tomcat/http/detected");
script_tag(name:"solution", value:"Example files should not be left on production servers.");
script_tag(name:"summary", value:"The remote Apache Tomcat Server is vulnerable to cross script scripting and
path disclosure issues.");
script_tag(name:"insight", value:"The default installation of Tomcat includes various sample jsp pages and
servlets.
One of these, the 'TroubleShooter' servlet, discloses various information about
the system on which Tomcat is installed. This servlet can also be used to
perform cross-site scripting attacks against third party users.");
script_tag(name:"solution_type", value:"Mitigation");
script_tag(name:"qod_type", value:"remote_vul");
exit(0);
}
include("http_func.inc");
include("http_keepalive.inc");
include("host_details.inc");
if( ! port = get_app_port( cpe:CPE, service:"www" ) ) exit( 0 );
if( ! dir = get_app_location( cpe:CPE, port:port ) ) exit( 0 );
url = "/examples/servlet/TroubleShooter";
req = http_get( item:url, port:port );
res = http_keepalive_send_recv( port:port, data:req );
confirmed = string( "TroubleShooter Servlet Output" );
confirmed_too = string( "hiddenValue" );
if( ( confirmed >< res ) && ( confirmed_too >< res ) ) {
report = http_report_vuln_url( port:port, url:url );
security_message( port:port, data:report );
exit( 0 );
}
exit( 99 );
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo