27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Apache Tomcat 5.5.x < 5.5.32 Cross-site Scripting Vulnerability<br />

<strong>PVS</strong> ID: 5787 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:51957<br />

Description: Synopsis : \n\nThe remote web server is affected by a cross-site scripting<br />

vulnerability\n\nFor your information, the observed version of Apache Tomcat installed on<br />

the remote host is : \n %L \n\nVersions of Tomcat 5.x earlier than 5.5.32 are potentially<br />

affected by a cross-site scripting vulnerability because the HTML Manager interface<br />

displays web application provided data, such as display names, without filtering.<br />

Solution: Upgrade to Apache Tomcat 5.5.32 or later.<br />

CVE-2011-0013<br />

Apache Tomcat 6.0.x < 6.0.28 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5788 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:48255<br />

Description: Synopsis : \n\nThe remote web server is vulnerable to multiple attack vectors.\n\nFor your<br />

information, the observed version of Apache Tomcat installed on the remote host is : \n %L<br />

\n\nVersions of Tomcat 6.x earlier than 6.0.28 are potentially affected by multiple<br />

vulnerabilities : \n\n - The 'WWW-Authenticate' HTTP header for BASIC and DIGEST<br />

authentication could potentially expose the local host name or IP adddress of the machine<br />

running Tomcat. (CVE-2010-1157)\n\n - Several flaws in handling of the<br />

'Transfer-Encoding' header exist that could prevent the recycling of a buffer.<br />

(CVE-2010-2227)<br />

Solution: Upgrade to Apache Tomcat 6.0.28 or later.<br />

CVE-2010-2227<br />

Apache Tomcat 6.0.x < 6.0.30 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5789 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:51975<br />

Description: Synopsis : \n\nThe remote web server is vulnerable to multiple attack vectors.\n\nFor your<br />

information, the observed version of Apache Tomcat installed on the remote host is : \n %L<br />

\n\nVersions of Tomcat 6.x earlier than 6.0.30 are potentially affected by multiple<br />

vulnerabilities : \n\n - When running under a <strong>Security</strong>Manager it is possible for a web<br />

application to gain read/write permissions to any area on the file system.<br />

(CVE-2010-3718)\n\n - It is possible to conduct cross-site scripting attacks via the 'sort' and<br />

'orderBy' parameers of the Manager application. (CVE-2010-4172)\n\n - The HTML<br />

Manager interface displays web application provided data, such as display names, without<br />

filtering. (CVE-2011-0013)<br />

Solution: Upgrade to Apache Tomcat 6.0.30 or later.<br />

Family Internet Services 1569

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!