VID |
22805 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
The version of Apache Tomcat installed on the remote host is 9.0.0.M1 or later but prior to 9.0.0.M22. It is, therefore, affected by multiple vulnerabilities :
- A flaw exists in the CORS filter because the HTTP Vary header was not properly added. This allows a remote attacker to conduct client-side and server-side cache poisoning attacks. (CVE-2017-7674)
- A flaw exists in the HTTP/2 implementation that bypasses a number of security checks that prevented directory traversal attacks. A remote attacker can exploit this to bypass security constraints. (CVE-2017-7675)
* References: http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.0.M22
* Platforms Affected: Apache Tomcat Server versions 9.x prior to 9.0.0.M22 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Apache Tomcat Server (9.0.0.M22 or later), available from the Apache Software Foundation download site, http://tomcat.apache.org/ |
Related URL |
CVE-2017-7674,CVE-2017-7675 (CVE) |
Related URL |
100256,100280 (SecurityFocus) |
Related URL |
(ISS) |
|