This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.
The remote Apache Tomcat server is affected by an information
According to its self-reported version number, the Apache Tomcat
service running on the remote host is 6.0.16 prior to 6.0.50, 7.0.x
prior to 7.0.75, 8.0.x prior to 8.0.41, or 8.5.x prior to 8.5.9. It is
therefore, affected by an information disclosure vulnerability in
error handling during send file processing by the NIO HTTP connector,
in which an error can cause the current Processor object to be added
to the Processor cache multiple times. This allows the same Processor
to be used for concurrent requests. An unauthenticated, remote
attacker can exploit this issue, via a shared Processor, to disclose
sensitive information, such as session IDs, response bodies related to
another request, etc.
Note that Nessus has not attempted to exploit this issue but has
instead relied only on the application's self-reported version number.
See also :
Upgrade to Apache Tomcat version 6.0.50 / 7.0.75 / 8.0.41 / 8.5.9 or
later. For the 6.0.x version branch, the vulnerability was fixed in
6.0.49; however, that release candidate was not approved, and 6.0.50
is still pending release.
Risk factor :
Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.2
Public Exploit Available : false