New! Vulnerability Priority Rating (VPR)
Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.
VPR Score: 3.6
SynopsisThe remote Apache Tomcat server is affected by multiple vulnerabilities.
DescriptionAccording to its self-reported version number, the instance of Apache Tomcat 6.0.x listening on the remote host is prior to 6.0.40. It is, therefore, affected by the following vulnerabilities :
- An error exists related to chunk size and chunked requests that allows denial of service attacks.
- An error exists related to XSLT handling and security managers that allows a security bypass related to external XML entities. (CVE-2014-0096)
- An error exists related to content length header handling and using the application behind a reverse proxy that allows a security bypass. (CVE-2014-0099)
- An error exists that allows undesired XML parsers to be injected into the application by a malicious web application, allows the bypassing of security controls, and allows the processing of external XML entities.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
SolutionUpgrade to Apache Tomcat version 6.0.41 or later.
Note that while version 6.0.40 fixes these issues, that version was not officially released, and the vendor recommends upgrading to 6.0.41 or later.