This script is Copyright (C) 2011-2014 Tenable Network Security, Inc.
The remote web server may be affected by a security bypass
According to its self-reported version number, the instance of Apache
Tomcat 7.x listening on the remote host is less than 7.0.4 and as
such, is reportedly affected by a security bypass vulnerability.
An error in the access restriction on a 'ServletContext' attribute
which holds the location of the work directory in Tomcat's
SecurityManager. A malicious web application may be able to modify the
location of the working directory which then allows improper read and
write access to arbitrary files and directories in the context of
Note that Nessus did not actually test for the flaw but instead has
relied on the version in Tomcat's banner or error page.
See also :
Either undeploy untrusted third-party web applications or upgrade to
Apache Tomcat version 7.0.4 or later.
Risk factor :
Medium / CVSS Base Score : 6.5
CVSS Temporal Score : 5.7
Public Exploit Available : true