Apache Tomcat 6.0.x < 6.0.53 / 7.0.x < 7.0.77 / 8.0.x < 8.0.43 Pipelined Requests Information Disclosure

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote Apache Tomcat server is affected by an information
disclosure vulnerability.

Description :

According to its self-reported version number, the Apache Tomcat
service running on the remote host is 6.0.x prior to 6.0.53, 7.0.x
prior to 7.0.77, or 8.0.x prior to 8.0.43. It is therefore, affected
by a flaw in the handling of pipelined requests when send file
processing is used that results in the pipelined request being lost
when processing of the previous request has completed, causing
responses to be sent for the wrong request. An unauthenticated, remote
attacker can exploit this to disclose sensitive information.

Note that Nessus has not attempted to exploit this issue but has
instead relied only on the application's self-reported version number.

See also :

https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.53
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.77
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.43

Solution :

Upgrade to Apache Tomcat version 6.0.53 / 7.0.77 / 8.0.43 or later.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score : 3.7
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Web Servers

Nessus Plugin ID: 99367 ()

Bugtraq ID: 97529

CVE ID: CVE-2017-5647

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now