Apache Tomcat is a servlet container for the Java Servlet and JavaServerPages (JSP) technologies.It was found that web applications could modify the location of the Tomcathost's work directory. As web applications deployed on Tomcat have read andwrite access to this directory, a malicious web application could use thisflaw to trick Tomcat into giving it read and write access to an arbitrarydirectory on the file system. (CVE-2010-3718)A cross-site scripting (XSS) flaw was found in the Manager application,used for managing web applications on Apache Tomcat. A malicious webapplication could use this flaw to conduct an XSS attack, leading toarbitrary web script execution with the privileges of victims who arelogged into and viewing Manager application web pages. (CVE-2011-0013)Multiple flaws were found in the way Tomcat handled HTTP DIGESTauthentication. These flaws weakened the Tomcat HTTP DIGEST authenticationimplementation, subjecting it to some of the weaknesses of HTTP BASICauthentication, for example, allowing remote attackers to perform sessionreplay attacks. (CVE-2011-1184)A flaw was found in the Tomcat MemoryUserDatabase. If a runtime exceptionoccurred when creating a new user with a JMX client, that user's passwordwas logged to Tomcat log files. Note: By default, only administrators haveaccess to such log files. (CVE-2011-2204)Users of Tomcat should upgrade to these updated packages, which containbackported patches to correct these issues. Tomcat must be restarted forthis update to take effect.