VID |
22510 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
According to its self-reported version number, the instance of Apache Tomcat listening on the remote host is greater than 6.0.11 and less than 6.0.30, or is 7.x and less than 7.0.5 and as such, may be affected by multiple cross-site scripting vulnerabilities.
Several cross-site scripting vulnerabilities exist in the Tomcat Manager application's 'sessionList.jsp' file. The parameters 'sort' and 'orderby' are not properly sanitized before being returned to the user and can be used to inject arbitrary script into the user's browser.
Also note, in the case of Tomcat 7.x, successful exploitation requires that the cross-site request forgery (CSRF) filter is disabled.
* Note: This check solely relied on the version number of the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://archives.neohapsis.com/archives/fulldisclosure/2010-11/0285.html http://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.30 http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.5_(released_1_Dec_2010)
* Platforms Affected: Apache Tomcat Server versions prior to 6.0.30 / 7.0.5 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Apache Tomcat Server (6.0.30 / 7.0.5 or later), available from the Apache Software Foundation download site, http://tomcat.apache.org/ |
Related URL |
CVE-2010-4172 (CVE) |
Related URL |
45015 (SecurityFocus) |
Related URL |
(ISS) |
|