HTTP: Tomcat ContextAdmin Access

This signature detects an attempt to exploit a known vulnerability in the Apache Tomcat package. The default mounted context (/admin) contains servlets used to add/delete/view context information on the server. Attackers can remotely add the root directory (/) as a context and gain access to all files readable by the current Tomcat account. For example, if Tomcat is running as root, all files on the filesystem can be accessed.

Extended Description

The Tomcat package, from the Apache Software Foundation, contains a vulnerability that could cause the disclosure of information that could lead to the compromise of the machine running Tomcat. By default, Tomcat contains a mounted context, /admin, that contains servlets that can be used to add and delete contexts, or view context information on the Tomcat server. By adding the root directory (/) as a context, it is possible to view files readable by the account Tomcat is running as. If Tomcat is running as root, all files on the filesystem may be accessed. This can in turn lead to the retrieval of vital information that may be used to gain access to the machine. There is no access control present to prevent unauthorized access to the /admin context. As such, any remote user can potentially exploit this vulnerability.

Affected Products

Apache_software_foundation apache

Short Name
SCAN:MISC:HTTP:CONTEXTADMIN
Severity
Info
Recommended
False
Recommended Action
None
Category
SCAN
Keywords
Access CVE-2000-0672 ContextAdmin Tomcat bid:1548
Release Date
04/22/2003
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Rarely
Vendors

Apache_software_foundation

CVSS Score

5.0

Found a potential security threat?