This script is Copyright (C) 2012-2015 Tenable Network Security, Inc.
The remote Scientific Linux host is missing one or more security
A cross-site scripting vulnerability was discovered in the
HttpServletResponse.sendError() method. A remote attacker could inject
arbitrary web script or HTML via forged HTTP headers. (CVE-2008-1232)
An additional cross-site scripting vulnerability was discovered in the
host manager application. A remote attacker could inject arbitrary web
script or HTML via the hostname parameter. (CVE-2008-1947)
A traversal vulnerability was discovered when using a
RequestDispatcher in combination with a servlet or JSP. A remote
attacker could utilize a specially crafted request parameter to access
protected web resources. (CVE-2008-2370)
An additional traversal vulnerability was discovered when the
'allowLinking' and 'URIencoding' settings were activated. A remote
attacker could use a UTF-8-encoded request to extend their privileges
and obtain local files accessible to the Tomcat process.
See also :
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 5.0
Public Exploit Available : true
Family: Scientific Linux Local Security Checks
Nessus Plugin ID: 60470 ()
CVE ID: CVE-2008-1232CVE-2008-1947CVE-2008-2370CVE-2008-2938
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.