VID |
22977 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
The version of Tomcat installed on the remote host is prior to 7.0.107. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_7.0.107_security-7 advisory.
- When serving resources from a network location using the NTFS file system, Apache Tomcat versions 10.0.0-M1 to 10.0.0-M9, 9.0.0.M1 to 9.0.39, 8.5.0 to 8.5.59 and 7.0.0 to 7.0.106 were susceptible to JSP source code disclosure in some configurations. The root cause was the unexpected behaviour of the JRE API File.getCanonicalPath() which in turn was caused by the inconsistent behaviour of the Windows API (FindFirstFileW) in some circumstances. (CVE-2021-24122)
* References: https://github.com/apache/tomcat/commit/800b03140e640f8892f27021e681645e8e320177 https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.107
* Platforms Affected: Apache Tomcat Server versions 7.0.x prior to 7.0.107 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Apache Tomcat Server (7.0.107 or later), available from the Apache Software Foundation download site, http://tomcat.apache.org/ |
Related URL |
CVE-2021-24122 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|