openSUSE Security Update : tomcat6 (openSUSE-SU-2011:0082-2)

medium Nessus Plugin ID 53806

Synopsis

The remote openSUSE host is missing a security update.

Description

This update fixes a cross-site scripting vulnerability that affects the session list screen. This can be used to steal session cookies because tomcat 6 does not use the httpOnly flag for its cookies.
(CVE-2010-4172)

Solution

Update the affected tomcat6 packages.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=655440

https://lists.opensuse.org/opensuse-updates/2011-02/msg00001.html

Plugin Details

Severity: Medium

ID: 53806

File Name: suse_11_2_tomcat6-110202.nasl

Version: 1.7

Type: local

Agent: unix

Published: 5/5/2011

Updated: 1/14/2021

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 2.9

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:tomcat6, p-cpe:/a:novell:opensuse:tomcat6-admin-webapps, p-cpe:/a:novell:opensuse:tomcat6-docs-webapp, p-cpe:/a:novell:opensuse:tomcat6-javadoc, p-cpe:/a:novell:opensuse:tomcat6-jsp-2_1-api, p-cpe:/a:novell:opensuse:tomcat6-lib, p-cpe:/a:novell:opensuse:tomcat6-servlet-2_5-api, p-cpe:/a:novell:opensuse:tomcat6-webapps, cpe:/o:novell:opensuse:11.2

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/2/2011

Exploitable With

Core Impact

Reference Information

CVE: CVE-2010-4172