This script is Copyright (C) 2010-2016 Tenable Network Security, Inc.
The remote Apache Tomcat server is affected by multiple
According to its self-reported version number, the instance of Apache
Tomcat 4.x listening on the remote host is prior to 4.1.32. It is,
therefore, affected by the following vulnerabilities :
- The remote Apache Tomcat install is vulnerable to a
denial of service attack. If directory listing is
enabled, function calls to retrieve the contents of
large directories can degrade performance.
- The remote Apache Tomcat install may be vulnerable to
a cross-site scripting attack if the JSP examples are
enabled. Several of these JSP examples do not properly
validate user input. (CVE-2005-4838)
- The remote Apache Tomcat install allows remote users
to list the contents of a directory by placing a
semicolon before a filename with a mapped extension.
- If enabled, the JSP calendar example application is
vulnerable to a cross-site scripting attack because
user input is not properly validated. (CVE-2006-7196)
- The remote Apache Tomcat install, in its default
configuration, permits the use of insecure ciphers when
using SSL. (CVE-2007-1858)
- The remote Apache Tomcat install may be vulnerable to an
information disclosure attack by allowing requests from
a non-permitted IP address to gain access to a context
that is protected with a valve that extends
Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number.
See also :
Upgrade to Apache Tomcat version 4.1.32 or later.
Risk factor :
Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 4.1
Public Exploit Available : true
Family: Web Servers
Nessus Plugin ID: 47029 ()
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now