This script is Copyright (C) 2011-2016 Tenable Network Security, Inc.
The remote Apache Tomcat server is affected by multiple
According to its self-reported version number, the instance of Apache
Tomcat 4.x listening on the remote host is prior to 4.1.36. It is,
therefore, affected by the following vulnerabilities :
- Requests containing multiple 'content-length' headers
are not rejected as invalid. This error can allow
web-cache poisoning, cross-site scripting attacks and
information disclosure. (CVE-2005-2090)
- An input sanitization error exists that can allow
disclosure of sensitive information via directory
traversal. This vulnerability is exposed when the
server is configured to use the 'Proxy' module.
- 'Accept-Language' headers are not validated properly,
which can allow cross-site scripting attacks.
Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number.
See also :
Update to Apache Tomcat version 4.1.36 or later.
Risk factor :
Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 5.0
Public Exploit Available : false