This script is Copyright (C) 2010-2016 Tenable Network Security, Inc.
The remote Apache Tomcat server is affected by multiple
According to its self-reported version number, the instance of Apache
Tomcat 4.x listening on the remote host is prior to 4.1.32. It is,
therefore, affected by the following vulnerabilities :
- The remote Apache Tomcat install is vulnerable to a
denial of service attack. If directory listing is
enabled, function calls to retrieve the contents of
large directories can degrade performance.
- The remote Apache Tomcat install may be vulnerable to
a cross-site scripting attack if the JSP examples are
enabled. Several of these JSP examples do not properly
validate user input. (CVE-2005-4838)
- The remote Apache Tomcat install allows remote users
to list the contents of a directory by placing a
semicolon before a filename with a mapped extension.
- If enabled, the JSP calendar example application is
vulnerable to a cross-site scripting attack because
user input is not properly validated. (CVE-2006-7196)
- The remote Apache Tomcat install, in its default
configuration, permits the use of insecure ciphers when
using SSL. (CVE-2007-1858)
- The remote Apache Tomcat install may be vulnerable to an
information disclosure attack by allowing requests from
a non-permitted IP address to gain access to a context
that is protected with a valve that extends
Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number.
See also :
Upgrade to Apache Tomcat version 4.1.32 or later.
Risk factor :
Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 4.1
Public Exploit Available : true
Family: Web Servers
Nessus Plugin ID: 47029 ()
Bugtraq ID: 1532519106255312848231698
CVE ID: CVE-2005-3510CVE-2005-4838CVE-2006-3835CVE-2006-7196CVE-2007-1858CVE-2008-3271
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.