This script is Copyright (C) 2011-2014 Tenable Network Security, Inc.
The remote web server may be affected by a security bypass
According to its self-reported version number, the instance of Apache
Tomcat 7.x listening on the remote host is less than 7.0.4 and as
such, is reportedly affected by a security bypass vulnerability.
An error in the access restriction on a 'ServletContext' attribute
which holds the location of the work directory in Tomcat's
SecurityManager. A malicious web application may be able to modify the
location of the working directory which then allows improper read and
write access to arbitrary files and directories in the context of
Note that Nessus did not actually test for the flaw but instead has
relied on the version in Tomcat's banner or error page.
See also :
Either undeploy untrusted third-party web applications or upgrade to
Apache Tomcat version 7.0.4 or later.
Risk factor :
Medium / CVSS Base Score : 6.5
CVSS Temporal Score : 5.7
Public Exploit Available : true
Family: Web Servers
Nessus Plugin ID: 51958 ()
Bugtraq ID: 46177
CVE ID: CVE-2010-3718
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.