[NEWS] Tomcat Documentation XSS Vulnerabilities



The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html

- - - - - - - - -



Tomcat Documentation XSS Vulnerabilities
------------------------------------------------------------------------


SUMMARY

The Tomcat documentation web application includes a sample application
that contains multiple XSS vulnerabilities.

DETAILS

Vulnerable Systems:
* Tomcat versions from 4.0.0 to 4.0.6
* Tomcat versions from 4.1.0 to 4.1.36
* Tomcat versions from 5.0.0 to 5.0.30
* Tomcat versions from 5.5.0 to 5.5.23
* Tomcat versions from 6.0.0 to 6.0.10

Immune Systems:
* Tomcat version 4.0.7
* Tomcat version 4.1.37
* Tomcat version 5.0.31
* Tomcat version 5.5.24
* Tomcat version 6.0.11

The JSP and Servlet included in the sample application within the Tomcat
documentation webapp did not escape user provided data before including it
in the output. This enabled a XSS attack. These pages have been simplified
not to use any user provided data in the output.

Example:
http://server/tomcat-docs/appdev/sample/web/hello.jsp?test=<script>alert(document.domain)</script>

CVE Information:
<http://www.cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2007-1355>
CVE-2007-1355


ADDITIONAL INFORMATION

The information has been provided by <mailto:markt@xxxxxxxxxx> Mark
Thomas.
The original article can be found at:
<http://tomcat.apache.org/security-6.html>
http://tomcat.apache.org/security-6.html



========================================


This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx


====================
====================

DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.



Relevant Pages

  • [NEWS] Apache Tomcat JK Web Server Connector Long URL Stack Overflow
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Apache Tomcat JK Web Server Connector Long URL Stack Overflow ... Authentication is not required to exploit this vulnerability. ...
    (Securiteam)
  • [UNIX] Apache Tomcat XSS Vulnerability
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Apache Tomcat XSS Vulnerability ... result in arbitrary content being injected into the HTTP response. ... In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages. ...
    (Securiteam)
  • [UNIX] Apache Tomcat Information Disclosure (RemoteFilterValve)
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Apache Tomcat Information Disclosure (RemoteFilterValve) ... Tomcat can, in very rare circumstances, permit a user from a non-permitted ...
    (Securiteam)
  • [UNIX] Tomcat Cookie Handling Vulnerabilities
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Tomcat Cookie Handling Vulnerabilities ... The previous fix for Tomcat vulnerability CVE-2007-3385 was incomplete. ...
    (Securiteam)
  • [Full-disclosure] [CVE-2007-1355] Tomcat documentation XSS vulnerabilities
    ... CVE-2007-1355: Tomcat documentation XSS vulnerabilities ... The Tomcat documentation web application includes a sample application ... Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org ...
    (Full-Disclosure)