Apache Tomcat 7.0.12 / 7.0.13 Security Constraint Bypass

Medium Nessus Plugin ID 54301


The remote web server is affected by a security constraint bypass vulnerability


According to its self-reported version number, the instance of Apache Tomcat 7.0.12 or 7.0.13 listening on the remote host is affected by a security constraint bypass vulnerability.

Fixes for CVE-2011-1088 and CVE-2011-1183 introduced an error in 'core/StandardWrapper.java' which allows an incorrect class loader to be used. The effect of this is that security constraints configured through annotations are ignored on the initial request to a servlet.
However, further requests are secured properly.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.


Upgrade to Apache Tomcat version 7.0.14 or later.

See Also




Plugin Details

Severity: Medium

ID: 54301

File Name: tomcat_7_0_14.nasl

Version: 1.14

Type: combined

Agent: windows, macosx, unix

Family: Web Servers

Published: 2011/05/18

Updated: 2020/03/11

Dependencies: 39446, 130175, 130590

Risk Information

Risk Factor: Medium

CVSS Score Source: CVE-2011-1582

CVSS v2.0

Base Score: 5.1

Temporal Score: 3.8

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 5.6

Temporal Score: 4.9

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apache:tomcat

Required KB Items: installed_sw/Apache Tomcat

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2011/05/12

Vulnerability Publication Date: 2011/05/17

Reference Information

CVE: CVE-2011-1582

BID: 47886

Secunia: 44612