MiracleLinux 4 : tomcat6-6.0.24-33.AXS4 (AXSA:2011-642:02)

medium Nessus Plugin ID 284044

Synopsis

The remote MiracleLinux host is missing one or more security updates.

Description

The remote MiracleLinux 4 host has packages installed that are affected by multiple vulnerabilities as referenced in the AXSA:2011-642:02 advisory.

Tomcat is the servlet container that is used in the official Reference Implementation for the Java Servlet and JavaServer Pages technologies. The Java Servlet and JavaServer Pages specifications are developed by Sun under the Java Community Process.
Tomcat is developed in an open and participatory environment and released under the Apache Software License version 2.0. Tomcat is intended to be a collaboration of the best-of-breed developers from around the world.
Security issues fixed with this release:
CVE-2010-3718 Apache Tomcat 7.0.0 through 7.0.3, 6.0.x, and 5.5.x, when running within a SecurityManager, does not make the ServletContext attribute read-only, which allows local web applications to read or write files outside of the intended working directory, as demonstrated using a directory traversal attack.
CVE-2010-4172 Multiple cross-site scripting (XSS) vulnerabilities in the Manager application in Apache Tomcat 6.0.12 through 6.0.29 and 7.0.0 through 7.0.4 allow remote attackers to inject arbitrary web script or HTML via the (1) orderBy or (2) sort parameter to sessionsList.jsp, or unspecified input to (3) sessionDetail.jsp or (4) java/org/apache/catalina/manager/JspHelper.java, related to use of untrusted web applications.
CVE-2011-0013 Multiple cross-site scripting (XSS) vulnerabilities in the HTML Manager Interface in Apache Software Foundation Tomcat 7.0 before 7.0.6, 5.5 before 5.5.32, and 6.0 before 6.0.30 allow remote attackers to inject arbitrary web script or HTML, as demonstrated via the display-name tag.
Fixed bugs:
- Multiple instances of Tomcat can be run simultaneously.
- Added a symbolic link to the /usr/share/tomcat6/bin/tomcat-juli.jar library needed by the build-jar- repository command.
- This update modifies the init script to work correctly regardless of the daemon user's login shell, preventing the following error message to appear: This account is currently not available. Additionally, these new tomcat6 packages now set /sbin/nologin as the login shell for the tomcat user upon installation, as recommended by deployment best practices.
- Some standard Tomcat directories were missing write permissions for the tomcat group. This has been fixed and errors such as No output folder no longer appear.

Tenable has extracted the preceding description block directly from the MiracleLinux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://tsn.miraclelinux.com/en/node/2359

Plugin Details

Severity: Medium

ID: 284044

File Name: miracle_linux_AXSA-2011-642.nasl

Version: 1.1

Type: local

Published: 1/14/2026

Updated: 1/14/2026

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 2.9

Vendor

Vendor Severity: High

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS Score Source: CVE-2011-0013

CVSS v3

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:miracle:linux:tomcat6-lib, p-cpe:/a:miracle:linux:tomcat6, p-cpe:/a:miracle:linux:tomcat6-el-2.1-api, p-cpe:/a:miracle:linux:tomcat6-servlet-2.5-api, p-cpe:/a:miracle:linux:tomcat6-jsp-2.1-api, cpe:/o:miracle:linux:4

Required KB Items: Host/local_checks_enabled, Host/MiracleLinux/release, Host/MiracleLinux/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/28/2011

Vulnerability Publication Date: 11/22/2010

Exploitable With

Core Impact

Reference Information

CVE: CVE-2010-3718, CVE-2010-4172, CVE-2011-0013