How to Buy
This script is Copyright (C) 2010-2016 Tenable Network Security, Inc.
The remote Apache Tomcat server is affected by multiple
According to its self-reported version number, the Apache Tomcat
server listening on the remote host is 5.5.x prior to 5.5.30. It is,
therefore, affected by multiple vulnerabilities :
- An error in the access restriction on a 'ServletContext'
attribute which holds the location of the work
directory in Tomcat's SecurityManager. A remote attacker
may be able to modify the location of the working
directory which then allows improper read and write
access to arbitrary files and directories in the context
- An error exists in the handling of the
'Transfer-Encoding' header of a client request. This
error affects buffer recycling and may lead to the
disclosure of sensitive information or allow a denial
of service attack to be successful. (CVE-2010-2227)
- An error exists in the handling of the '<realm-name>'
element in a web application's web.xml file. If the
element is missing from the web.xml file and the
application is using BASIC or DIGEST authentication,
Tomcat will include the server's hostname or IP address
in the 'WWW-Authenticate' header of the response.
Note that Nessus did not actually test for the flaws but instead has
relied on the version in Tomcat's banner or error page so this may be
a false positive.
See also :
Upgrade to Tomcat version 5.5.30 or later.
Risk factor :
Medium / CVSS Base Score : 6.5
CVSS Temporal Score : 5.7
Public Exploit Available : true
Family: Web Servers
Nessus Plugin ID: 47749 ()
Bugtraq ID: 396354154446177
CVE ID: CVE-2010-3718CVE-2010-2227CVE-2010-1157
Get Nessus Professional to scan unlimited IPs, run compliance checks & more
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.