Check Point Reference: | CPAI-2014-1159 |
Date Published: | 17 Mar 2014 |
Severity: | Medium |
Last Updated: | Sunday 19 April, 2015 |
Source: | |
Industry Reference: | CVE-2002-2006 CVE-2002-2007 CVE-2002-2008 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | Apache Software Foundation Tomcat 4.x Apache Software Foundation Tomcat 3.x |
Vulnerability Description | An Information disclosure vulnerability has been reported in Apache Tomcat servers. The vulnerability is due to an error in the way Apache Tomcat handles specially crafted page requests. A remote attacker can exploit this vulnerability by sending crafted requests which will result in Apache Tomcat returning an error page containing information that includes the absolute path to the server's web root and possibly a directory listing. This protection was previously known as Apache Tomcat Path Disclosure, Apache Tomcat RealPath and Apache Tomcat Malicious Request. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Apache Server Protection Violation.
Attack Information: Apache Tomcat Server Malicious Request Information Disclosure