VID |
22522 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
According to its self-reported version number, the instance of Apache Tomcat 7.0.12 or 7.0.13 listening on the remote host may be affected by a security constraint bypass vulnerability.
Fixes for CVE-2011-1088 and CVE-2011-1183 introduced an error in 'core/StandardWrapper.java' which allows an incorrect class loader to be used. The effect of this is that security constraints configured through annotations are ignored on the initial request to a servlet. However, further requests are secured properly.
* Note: This check solely relied on the version number of the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.14_%28released_12_May_2011%29 http://svn.apache.org/viewvc?view=revision&revision=1100832 http://archives.neohapsis.com/archives/bugtraq/2011-05/0135.html
* Platforms Affected: Apache Tomcat Server versions to 7.0.12, 7.0.13 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Apache Tomcat Server (7.0.14 or later), available from the Apache Software Foundation download site, http://tomcat.apache.org/ |
Related URL |
CVE-2011-1582 (CVE) |
Related URL |
47886 (SecurityFocus) |
Related URL |
(ISS) |
|