VID |
210076 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The Apache Tomcat server contains the 'cal2.jsp' sample script that is vulnerable to a cross-site scripting attack. Apache Tomcat 4.0.0 - 4.0.6, 4.1.0 - 4.1.31, 5.0.0 - 5.0.30, and 5.5.0 - 5.5.15 are vulnerable to a cross-site scripting vulnerability, caused by improper validation of user-supplied input passed to the /jsp-examples/cal/cal2.jsp and /examples/jsp/cal/cal2.jsp sample scripts. This vulnerability could allow a remote attacker to create a malicious URI link that includes hostile HTML and script code. If this link were to be followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks.
* References: http://tomcat.apache.org/security-4.html http://tomcat.apache.org/security-5.html http://www.securityfocus.com/archive/1/478491/30/0/threaded http://www.securityfocus.com/archive/1/478609/30/0/threaded http://www.frsirt.com/english/advisories/2007/1729
* Platforms Affected: The Apache Software Foundation, Tomcat 4.0.0 - 4.0.6 The Apache Software Foundation, Tomcat 4.1.0 - 4.1.31 The Apache Software Foundation, Tomcat 5.0.0 - 5.0.30 The Apache Software Foundation, Tomcat 5.5.0 - 5.5.15 Any operating system Any version |
Recommendation |
If it is not required, remove the Tomcat example web applications.
-- OR --
Upgrade to the latest version of Apache Tomcat (4.1.32 or 5.5.16 or later), available from the Apache Tomcat Web sites at http://tomcat.apache.org/security-4.html and http://tomcat.apache.org/security-5.html |
Related URL |
CVE-2006-7196 (CVE) |
Related URL |
25531 (SecurityFocus) |
Related URL |
34209 (ISS) |
|