Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Apache Tomcat 6.x < 6.0.36 Multiple Vulnerabilities (Oct 2012) - Linux

Information

Severity

Severity

Medium

Family

Family

Web Servers

CVSSv2 Base

CVSSv2 Base

5.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:N/A:P

Solution Type

Solution Type

Vendor Patch

Created

Created

2 years ago

Modified

Modified

2 years ago

Summary

Apache Tomcat is prone to multiple vulnerabilities.

Insight

Insight

The following vulnerabilities exist: - CVE-2012-4431: The CSRF prevention filter could be bypassed if a request was made to a protected resource without a session identifier present in the request. - CVE-2012-2733: The checks that limited the permitted size of request headers were implemented too late in the request parsing process for the HTTP NIO connector. This enabled a malicious user to trigger an OutOfMemoryError by sending a single request with very large headers. - CVE-2012-4534: When using the NIO connector with sendfile and HTTPS enabled, if a client breaks the connection while reading the response an infinite loop is entered leading to a denial of service. - CVE-2012-3439: DIGEST authentication weakness - CVE-2012-3546: When using FORM authentication it was possible to bypass the security constraint checks in the FORM authenticator by appending /j_security_check to the end of the URL if some other component (such as the Single-Sign-On valve) had called request.setUserPrincipal() before the call to FormAuthenticator#authenticate().

Affected Software

Affected Software

Apache Tomcat version 6.0.x through 6.0.35.

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

Update to version 6.0.36 or later.

Common Vulnerabilities and Exposures (CVE)