Apache Tomcat Manager Common Administrative Credentials

Critical Nessus Plugin ID 34970


The management console for the remote web server is protected using a known set of credentials.


Nessus was able to gain access to the Manager web application for the remote Tomcat server using a known set of credentials. A remote attacker can exploit this issue to install a malicious application on the affected server and run arbitrary code with Tomcat's privileges (usually SYSTEM on Windows, or the unprivileged 'tomcat' account on Unix). Note that worms are known to propagate this way.


Edit the associated 'tomcat-users.xml' file and change or remove the affected set of credentials.

See Also






Plugin Details

Severity: Critical

ID: 34970

File Name: tomcat_manager_common_creds.nasl

Version: $Revision: 1.37 $

Type: remote

Family: Web Servers

Published: 2008/11/26

Modified: 2018/01/24

Dependencies: 39446

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C


Base Score: 9.8

Temporal Score: 9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apache:tomcat

Required KB Items: installed_sw/Apache Tomcat

Excluded KB Items: global_settings/supplied_logins_only

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 2009/11/09

Exploitable With

Core Impact

Metasploit (Apache Tomcat Manager Authenticated Upload Code Execution)

Reference Information

CVE: CVE-2009-3099, CVE-2009-3548, CVE-2010-0557, CVE-2010-4094

BID: 36253, 36954, 37086, 38084, 44172

OSVDB: 57898, 60176, 60317, 62118, 69008

EDB-ID: 18619, 31433

ZDI: ZDI-10-214

CWE: 255