4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
mod_perl is vulnerable to cross-site scripting (XSS). A remote attacker is able to inject and execute arbitrary Javascript in a user’s browser via el/functions.jsp
, el/implicit-objects.jsp
and jspx/textRotate.jspx
in examples/jsp2
.
CPE | Name | Operator | Version |
---|---|---|---|
mod_perl | eq | 2.0.2__4.el4s1.2 | |
mod_perl | eq | 2.0.2__4.el4s1.2 |
lists.grok.org.uk/pipermail/full-disclosure/2007-September/065598.html
marc.info/?l=tomcat-dev&m=110476790331536&w=2
marc.info/?l=tomcat-dev&m=110477195116951&w=2
rhn.redhat.com/errata/RHSA-2008-0630.html
secunia.com/advisories/13737
secunia.com/advisories/31493
securitytracker.com/id?1012793
tomcat.apache.org/security-4.html
tomcat.apache.org/security-5.html
www.oliverkarow.de/research/jakarta556_xss.txt
www.osvdb.org/12721
www.osvdb.org/34878
www.osvdb.org/34879
www.redhat.com/security/updates/classification/#low
www.redhat.com/support/errata/RHSA-2008-0261.html
access.redhat.com/errata/RHSA-2008:0630
exchange.xforce.ibmcloud.com/vulnerabilities/36467
lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E
lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E
lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E
lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E
lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E