Hi Chuck, We are using tomcat version 9.87 can you guide on the same.
Thanks & Regards, Pramod Kumar Adhi From: Chuck Caldarale <n82...@gmail.com> Sent: Tuesday, July 9, 2024 12:31 AM To: Tomcat Users List <users@tomcat.apache.org> Subject: Re: Apache Tomcat Default Files - TEN-12085 [External Email] > On Jul 8, 2024, at 13:56, Pramod Kumar Adhi > <pramodkumar.a...@servicenow.com.INVALID<mailto:pramodkumar.a...@servicenow.com.INVALID>> > wrote: > > We have one vulnerability related to the TEN-12085.Could you please advise on > the below on how can we remediate this vulnerability. > > Vulnerability Description > > The server is not configured to return a custom page in the event of a client > requesting a non-existent resource. > This may result in a potential disclosure of sensitive information about the > server to attackers. > > Vulnerability Summary > > The default error page, default index page, example JSPs and/or example > servlets are installed on the remote Apache Tomcat server. These files should > be removed as they may help an attacker uncover information about the remote > Tomcat install or host itself. > > Vulnerability Threat > The remote web server contains default files. > Vulnerability Remediation notes > Delete the default index page and remove the example JSP and servlets. Follow > the Tomcat or OWASP instructions to replace or modify the default error page. The above is fairly explicit about what to do to resolve this so-called “vulnerability”. Just follow the instructions that the test gave you. For an even more explicit description, read this (which you should have already done): https://tomcat.apache.org/tomcat-10.1-doc/security-howto.html<https://tomcat.apache.org/tomcat-10.1-doc/security-howto.html> - Chuck