Korean
<< Back
VID 22111
Severity 30
Port 8080
Protocol TCP
Class Servlet
Detailed Description The Apache Tomcat is vulnerable XSS attacks by issueing requests for the /servlet/ mapping.
The Apache Tomcat Servlet Server has a couple of Cross Site Scripting vulnerabilities.
Apache Tomcat is the servlet container that is used in the official Reference Implementation for the Java Servlet and JavaServer Pages technologies.
By using the /servlet/ mapping to invoke various servlets / classes it is possible to cause Tomcat to throw an exception, allowing Cross Site Scripting (XSS) attacks, e.g:

tomcat-server/servlet/org.apache.catalina.servlets.WebdavStatus/SCRIPTalert(document.domain)/SCRIPT
tomcat-server/servlet/org.apache.catalina.ContainerServlet/SCRIPTalert(document.domain)/SCRIPT
tomcat-server/servlet/org.apache.catalina.Context/SCRIPTalert(document.domain)/SCRIPT
tomcat-server/servlet/org.apache.catalina.Globals/SCRIPTalert(document.domain)/SCRIPT

(angle brackets omitted)

* References:
http://tomcat.apache.org/security-4.html
http://www.securiteam.com/windowsntfocus/5KP0L007FI.html

Platforms Affected:
* Apache Tomcat v4.0.3
* Windows NT/2000
* Linux
Recommendation The 'invoker' servlet (mapped to /servlet/), which executes anonymous servlet classes that have not been defined in a web.xml file should be unmapped.

The entry for this can be found in the /tomcat-install-dir/conf/web.xml file.
Related URL (CVE)
Related URL (SecurityFocus)
Related URL (ISS)