Have received new scan with the following entries for vulnerabilities.
126245 | Apache Tomcat 9.0.0.M1 < 9.0.20 DoS | Medium | 0 | Plugin Output: Path : /spectrum/Install-Tools/LOGS/10.4.1.0.215_20200710/SavedInstall.1719/webtomcat/bin/ Installed version : 9.0.13 Fixed version : 9.0.20 |
The version of Tomcat installed on the remote host is prior to 9.0.20. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_9.0.20_security-9 advisory. - The fix for CVE-2019-0199 was incomplete and did not address HTTP/2 connection window exhaustion on write. By not sending WINDOW_UPDATE messages for the connection window (stream 0) clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS. (CVE-2019-10072) Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. |
Upgrade to Apache Tomcat version 9.0.20 or later. |
126312 | Apache Tomcat 9.0.0.M1 < 9.0.16 DoS | Medium | 0 | Plugin Output: Path : /spectrum/Install-Tools/LOGS/10.4.1.0.215_20200710/SavedInstall.1719/webtomcat/bin/ Installed version : 9.0.13 Fixed version : 9.0.16 |
The version of Tomcat installed on the remote host is prior to 9.0.16. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_9.0.16_security-9 advisory. - The HTTP/2 implementation accepted streams with excessive numbers of SETTINGS frames and also permitted clients to keep streams open without reading/writing request/response data. By keeping streams open for requests that utilised the Servlet API's blocking I/O, clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS. (CVE-2019-0199) Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. |
Upgrade to Apache Tomcat version 9.0.16 or later. |
132419 | Apache Tomcat 9.0.0.M1 < 9.0.30 Privilege Escalation Vulnerability | Medium | 0 | Plugin Output: Path : /spectrum/Install-Tools/LOGS/10.4.1.0.215_20200710/SavedInstall.1719/webtomcat/bin/ Installed version : 9.0.13 Fixed version : 9.0.30 |
The version of Tomcat installed on the remote host is prior to 9.0.30. It is, therefore, affected by a privilege escalation vulnerability as referenced in the 'Fixed in Apache Tomcat 9.0.30' advisory. - When using FORM authentication there was a narrow window where an attacker could perform a session fixation attack. The window was considered too narrow for an exploit to be practical but, erring on the side of caution, this issue has been treated as a security vulnerability. (CVE-2019-17563) Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. |
Upgrade to Apache Tomcat version 9.0.30 or later. |
133845 | Apache Tomcat < 7.0.100 / 8.5.x < 8.5.51 / 9.x < 9.0.31 Multiple Vulnerabilities | High | 0 | Plugin Output: Path : /spectrum/Install-Tools/LOGS/10.4.1.0.215_20200710/SavedInstall.1719/webtomcat/bin/ Installed version : 9.0.13 Fixed version : 9.0.31 |
The version of Tomcat installed on the remote host is prior to 7.0.100, 8.x prior to 8.5.51, or 9.x prior to 9.0.31. It is, therefore, affected by multiple vulnerabilities. - An HTTP request smuggling vulnerability exists in Tomcat due to mishandling Transfer-Encoding headers behind a reverse proxy. An unauthenticated, remote attacker can exploit this, via crafted HTTP requests, to cause unintended HTTP requests to reach the back-end. (CVE-2019-17569) - An HTTP request smuggling vulnerability exists in Tomcat due to bad end-of-line (EOL) parsing that allowed some invalid HTTP headers to be parsed as valid. An unauthenticated, remote attacker can exploit this, via crafted HTTP requests, to cause unintended HTTP requests to reach the back-end. (CVE-2020-1935) - An arbitrary file read vulnerability exists in Tomcat's Apache JServ Protocol (AJP) due to an implementation defect. A remote, unauthenticated attacker could exploit this to access files which, under normal conditions, would be restricted. If the Tomcat instance supports file uploads, the vulnerability could also be leveraged to achieve remote code execution. (CVE-2020-1938) Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. |
Upgrade to Apache Tomcat version 7.0.100, 8.5.51, 9.0.31 or later. |
136806 | Apache Tomcat 9.0.0 < 9.0.35 Remote Code Execution | Medium | 0 | Plugin Output: Path : /spectrum/Install-Tools/LOGS/10.4.1.0.215_20200710/SavedInstall.1719/webtomcat/bin/ Installed version : 9.0.13 Fixed version : 9.0.35 |
The version of Tomcat installed on the remote host is prior to 9.0.35. It is, therefore, affected by a remote code execution vulnerability as referenced in the fixed_in_apache_tomcat_9.0.35_security-9 advisory. Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. | Upgrade to Apache Tomcat version 9.0.35 or later. |
138098 | Apache Tomcat 9.0.0.M1 < 9.0.36 DoS | Medium | 0 | Plugin Output: Path : /spectrum/Install-Tools/LOGS/10.4.1.0.215_20200710/SavedInstall.1719/webtomcat/bin/ Installed version : 9.0.13 Fixed version : 9.0.36 |
The version of Tomcat installed on the remote host is prior to 9.0.36. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_9.0.36_security-9 advisory. - A specially crafted sequence of HTTP/2 requests could trigger high CPU usage for several seconds. If a sufficient number of such requests were made on concurrent HTTP/2 connections, the server could become unresponsive. (CVE-2020-11996) Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. |
Upgrade to Apache Tomcat version 9.0.36 or later. |
138591 | Apache Tomcat 9.0.0.M1 < 9.0.37 Multiple Vulnerabilities | Medium | 0 | Plugin Output: Path : /spectrum/Install-Tools/LOGS/10.4.1.0.215_20200710/SavedInstall.1719/webtomcat/bin/ Installed version : 9.0.13 Fixed version : 9.0.37 |
The version of Tomcat installed on the remote host is prior to 9.0.37. It is, therefore, affected by multiple vulnerabilities as referenced in the fixed_in_apache_tomcat_9.0.37_security-9 advisory. Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. | Upgrade to Apache Tomcat version 9.0.37 or later. |
141446 | Apache Tomcat 8.5.x < 8.5.58 / 9.0.x < 9.0.38 HTTP/2 Request Mix-Up | Medium | 0 | Plugin Output: Path : /spectrum/Install-Tools/LOGS/10.4.1.0.215_20200710/SavedInstall.1719/webtomcat/bin/ Installed version : 9.0.13 Fixed version : 9.0.38 |
The version of Tomcat installed on the remote host is 8.5.x prior to 8.5.58 or 9.0.x prior to 9.0.38. It is, therefore, affected by a vulnerability. If an HTTP/2 client exceeds the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it is possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This can lead to users seeing responses for unexpected resources. Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. |
Upgrade to Apache Tomcat version 8.5.58, 9.0.38 or later. |
Release : 10.4.1
Component : Spectrum Core / SpectroSERVER
These are older/backed up install areas during some upgrades.
These directories can simply be deleted.