Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA225] DSA-225-1 tomcat4

Vulnerability Assessment Details

[DSA225] DSA-225-1 tomcat4

Vulnerability Assessment Summary
DSA-225-1 tomcat4

Detailed Explanation for this Vulnerability Assessment

A security vulnerability has been confirmed to exist in Apache Tomcat
4.0.x releases, which permits to use a specially crafted URL to return
the unprocessed source of a JSP page, or, under special circumstances,
a static resource which would otherwise have been protected by a
security constraint, without the need for being properly
authenticated. This is based on a variant of the exploit that was
identified as CVE-2002-1148.
For the current stable distribution (woody) this problem has been
fixed in version 4.0.3-3woody2.
The old stable distribution (potato) does not contain tomcat packages.
For the unstable distribution (sid) this problem does not exist in the
current version 4.1.16-1.
We recommend that you upgrade your tomcat packages.

Solution :
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors


No Discussions have been posted on this vulnerability.