6.4 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:P/A:P
0.013 Low
EPSS
Percentile
85.8%
According to its self-reported version number, the instance of Apache Tomcat 6.0.x listening on the remote host is prior to 6.0.30. It is, therefore, affected by multiple vulnerabilities:
An error in the access restriction on a ‘ServletContext’ attribute that holds the location of the work directory in Tomcat’s SecurityManager. A malicious web application can modify the location of the working directory which then allows improper read and write access to arbitrary files and directories in the context of Tomcat. (CVE-2010-3718)
An input validation error exists in the Manager application in that it fails to filter the ‘sort’ and ‘orderBy’ input parameters. (CVE-2010-4172)
The default configuration does not include the HTTPOnly flag in a Set-Cookie header, which makes it easier for remote attackers to hijack a session via script access to a cookie. (CVE-2010-4312)
An input validation error exists in the HTML manager application in that it fails to filter various input data before returning it to the browser. (CVE-2011-0013)
Note that Nessus Network Monitor has not tested for these issues but has instead relied only on the application’s self-reported version number.
Binary data 5789.pasl