Korean
<< Back
VID 22519
Severity 30
Port 80, ...
Protocol TCP
Class WWW
Detailed Description According to its self-reported version number, the instance of Apache Tomcat 7.x listening on the remote host is earlier than 7.0.12 and as such, may be affected by one or both of the following vulnerabilities :

- A fix for CVE-2011-1088 introduced a security bypass vulnerability. If login configuration data is absent from the 'web.xml' file and a web application is marked as 'metadata-complete', security constraints are ignored and may be bypassed by an attacker. Please note this vulnerability only affects version 7.0.11 of Tomcat. (CVE-2011-1183)

- Updates to the HTTP BIO connector, in support of Servlet 3.0 asynchronous requests, fail to completely handle HTTP pipelining. Sensitive information may be disclosed because responses from the server can be improperly returned to the wrong request and possibly to the wrong user. (CVE-2011-1475)

* Note: This check solely relied on the version number of the remote Web server to assess this vulnerability, so this might be a false positive.

* References:
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.12_(released_6_Apr_2011)
https://issues.apache.org/bugzilla/show_bug.cgi?id=50928
http://svn.apache.org/viewvc?view=revision&revision=1087643

* Platforms Affected:
Apache Tomcat Server versions prior to 7.0.12
Any operating system Any version
Recommendation Upgrade to the latest version of Apache Tomcat Server (7.0.12 or later), available from the Apache Software Foundation download site, http://tomcat.apache.org/
Related URL CVE-2011-1183,CVE-2011-1475 (CVE)
Related URL 47196,47199 (SecurityFocus)
Related URL (ISS)