This script is Copyright (C) 2013-2015 Tenable Network Security, Inc.
The remote Oracle Linux host is missing one or more security updates.
From Red Hat Security Advisory 2008:0648 :
Updated tomcat packages that fix several security issues are now
available for Red Hat Enterprise Linux 5.
This update has been rated as having important security impact by the
Red Hat Security Response Team.
Apache Tomcat is a servlet container for the Java Servlet and
JavaServer Pages (JSP) technologies.
A cross-site scripting vulnerability was discovered in the
HttpServletResponse.sendError() method. A remote attacker could inject
arbitrary web script or HTML via forged HTTP headers. (CVE-2008-1232)
An additional cross-site scripting vulnerability was discovered in the
host manager application. A remote attacker could inject arbitrary web
script or HTML via the hostname parameter. (CVE-2008-1947)
A traversal vulnerability was discovered when using a
RequestDispatcher in combination with a servlet or JSP. A remote
attacker could utilize a specially crafted request parameter to access
protected web resources. (CVE-2008-2370)
An additional traversal vulnerability was discovered when the
'allowLinking' and 'URIencoding' settings were activated. A remote
attacker could use a UTF-8-encoded request to extend their privileges
and obtain local files accessible to the Tomcat process.
Users of tomcat should upgrade to these updated packages, which
contain backported patches to resolve these issues.
See also :
Update the affected tomcat packages.
Risk factor :
Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 4.3
Public Exploit Available : true
Family: Oracle Linux Local Security Checks
Nessus Plugin ID: 67733 ()
Bugtraq ID: 29502304943049630633
CVE ID: CVE-2008-1232CVE-2008-1947CVE-2008-2370CVE-2008-2938
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.