This script is Copyright (C) 2015-2016 Tenable Network Security, Inc.
The remote Apache Tomcat server is affected by a security bypass
According to its self-reported version number, the Apache Tomcat
server listening on the remote host is 7.0.x prior to 7.0.59. It is,
therefore, affected by a security bypass vulnerability due to a flaw
that occurs when handling expression language. A remote attacker can
exploit this, via a crafted web application, to bypass the security
manager protection and execute arbitrary code.
Note that Nessus has not tested for this issue but has instead relied
only on the application's self-reported version number.
See also :
Upgrade to Apache Tomcat version 7.0.59 or later.
Risk factor :
Medium / CVSS Base Score : 6.8
CVSS Temporal Score : 5.9
Public Exploit Available : false