Korean
<< Back
VID 22110
Severity 40
Port 8080
Protocol TCP
Class Servlet
Detailed Description The Tomcat package, from the Apache Software Foundation, contains a vulnerability that could cause the disclosure of information that could lead to the compromise of the machine running Tomcat. By default, Tomcat 3.0 and 3.1 running on various UNIX systems contain a mounted context (or virtual directory), /admin, that contains servlets that can be used to add and delete contexts, or view context information on the Tomcat server. By adding the root directory (/) as a context, it is possible to view files readable by the account Tomcat is running as. If Tomcat is running as root, all files on the filesystem may be accessed. This can in turn lead to the retrieval of vital information that may be used to gain access to the machine. There is no access control present to prevent unauthorized access to the /admin context. As such, any remote user can potentially exploit this vulnerability.
Recommendation 1) Do not run the Tomcat server as root.
2) Restrict access to the /admin context or remove it completely.
3) As possible as, Upgrade to the latest version.
Related URL CVE-2000-0672 (CVE)
Related URL 1548 (SecurityFocus)
Related URL 5160 (ISS)