Apache Tomcat Manager Bruteforced

high Web App Scanning Plugin ID 113114

Synopsis

Apache Tomcat Manager Bruteforced

Description

The scanner successfully authenticated on the target Apache Tomcat manager interface by using weak or predictable credentials.

Solution

The Apache Tomcat manager interface should not be configured with accounts using default or predictable credentials. A complex password policy should be defined and enforced on every account to prevent attackers from guessing it and gain unauthorized access. Refer to the Apache documentation to update the configuration according to the Tomcat version deployed.

See Also

https://cheatsheetseries.owasp.org/cheatsheets/Authentication_Cheat_Sheet.html

https://en.wikipedia.org/wiki/Password_strength

https://tomcat.apache.org/

Plugin Details

Severity: High

ID: 113114

Type: remote

Published: 1/12/2022

Updated: 1/12/2022

Scan Template: api, pci, scan

Risk Information

VPR

Risk Factor: Medium

Score: 5.4

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: Tenable

CVSS v3

Risk Factor: High

Base Score: 8.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L

CVSS Score Source: Tenable

CVSS v4

Risk Factor: High

Base Score: 8.8

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N

CVSS Score Source: Tenable

Reference Information