Description
Apache Tomcat default installation contains the "/examples" directory which has many example servlets and JSPs.
Some of these examples are a security risk and should not be deployed on a production server.
The Sessions Example servlet (installed at /examples/servlets/servlet/SessionExample) allows session manipulation. Because the session is global this servlet poses a big security risk as an attacker can potentitally become an administrator by manipulating its session.
Remediation
Disable public access to the examples directory.
References
Related Vulnerabilities
Moodle Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-0216)
Django Improper Validation of Specified Quantity in Input Vulnerability (CVE-2024-41991)
PHP Improper Input Validation Vulnerability (CVE-2016-7129)
Oracle HTTP Server Improper Encoding or Escaping of Output Vulnerability (CVE-2022-25235)