Short Name |
SCAN:MISC:HTTP:CONTEXTADMIN |
---|---|
Severity |
Info |
Recommended |
No |
Category |
SCAN |
Keywords |
Tomcat ContextAdmin Access |
Release Date |
2003/04/22 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects an attempt to exploit a known vulnerability in the Apache Tomcat package. The default mounted context (/admin) contains servlets used to add/delete/view context information on the server. Attackers can remotely add the root directory (/) as a context and gain access to all files readable by the current Tomcat account. For example, if Tomcat is running as root, all files on the filesystem can be accessed.
The Tomcat package, from the Apache Software Foundation, contains a vulnerability that could cause the disclosure of information that could lead to the compromise of the machine running Tomcat. By default, Tomcat contains a mounted context, /admin, that contains servlets that can be used to add and delete contexts, or view context information on the Tomcat server. By adding the root directory (/) as a context, it is possible to view files readable by the account Tomcat is running as. If Tomcat is running as root, all files on the filesystem may be accessed. This can in turn lead to the retrieval of vital information that may be used to gain access to the machine. There is no access control present to prevent unauthorized access to the /admin context. As such, any remote user can potentially exploit this vulnerability.