Apache Tomcat 4.x < 4.1.32 Multiple Vulnerabilities

This script is Copyright (C) 2010-2016 Tenable Network Security, Inc.

Synopsis :

The remote Apache Tomcat server is affected by multiple

Description :

According to its self-reported version number, the instance of Apache
Tomcat 4.x listening on the remote host is prior to 4.1.32. It is,
therefore, affected by the following vulnerabilities :

- The remote Apache Tomcat install is vulnerable to a
denial of service attack. If directory listing is
enabled, function calls to retrieve the contents of
large directories can degrade performance.

- The remote Apache Tomcat install may be vulnerable to
a cross-site scripting attack if the JSP examples are
enabled. Several of these JSP examples do not properly
validate user input. (CVE-2005-4838)

- The remote Apache Tomcat install allows remote users
to list the contents of a directory by placing a
semicolon before a filename with a mapped extension.

- If enabled, the JSP calendar example application is
vulnerable to a cross-site scripting attack because
user input is not properly validated. (CVE-2006-7196)

- The remote Apache Tomcat install, in its default
configuration, permits the use of insecure ciphers when
using SSL. (CVE-2007-1858)

- The remote Apache Tomcat install may be vulnerable to an
information disclosure attack by allowing requests from
a non-permitted IP address to gain access to a context
that is protected with a valve that extends
RequestFilterValve. (CVE-2008-3271)

Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number.

See also :


Solution :

Upgrade to Apache Tomcat version 4.1.32 or later.

Risk factor :

Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 4.1
Public Exploit Available : true

Family: Web Servers

Nessus Plugin ID: 47029 ()

Bugtraq ID: 15325

CVE ID: CVE-2005-3510

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now