Apache Tomcat 7.x < 7.0.4 SecurityManager Local Security Bypass

This script is Copyright (C) 2011-2014 Tenable Network Security, Inc.


Synopsis :

The remote web server may be affected by a security bypass
vulnerability.

Description :

According to its self-reported version number, the instance of Apache
Tomcat 7.x listening on the remote host is less than 7.0.4 and as
such, is reportedly affected by a security bypass vulnerability.

An error in the access restriction on a 'ServletContext' attribute
which holds the location of the work directory in Tomcat's
SecurityManager. A malicious web application may be able to modify the
location of the working directory which then allows improper read and
write access to arbitrary files and directories in the context of
Tomcat.

Note that Nessus did not actually test for the flaw but instead has
relied on the version in Tomcat's banner or error page.

See also :

http://www.nessus.org/u?8da12114
http://archives.neohapsis.com/archives/fulldisclosure/current/0074.html

Solution :

Either undeploy untrusted third-party web applications or upgrade to
Apache Tomcat version 7.0.4 or later.

Risk factor :

Medium / CVSS Base Score : 6.5
(CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P)
CVSS Temporal Score : 5.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Web Servers

Nessus Plugin ID: 51958 ()

Bugtraq ID: 46177

CVE ID: CVE-2010-3718