CVE-2007-2449

Properties

Published:
13.06.2007
Updated:
29.01.2009
Patch available:
Severity:
Medium
CVSS vector:
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Product:
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat
apache: tomcat

Vulnerability description

Multiple cross-site scripting (XSS) vulnerabilities in certain JSP files in the examples web application in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.24, and 6.0.0 through 6.0.13 allow remote attackers to inject arbitrary web script or HTML via the portion of the URI after the ';' character, as demonstrated by a URI containing a "snp/snoop.jsp;" sequence.

References:

CONFIRM: http://tomcat.apache.org/security-6.html
BUGTRAQ: http://www.securityfocus.com/archive/1/archive/1/500412/100/0/threaded
BUGTRAQ: http://www.securityfocus.com/archive/1/archive/1/471351/100/0/threaded
FRSIRT: http://www.frsirt.com/english/advisories/2009/0233
CONFIRM: http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540
SECUNIA: http://secunia.com/advisories/33668
SECUNIA: http://secunia.com/advisories/31493
REDHAT: http://rhn.redhat.com/errata/RHSA-2008-0630.html
HP: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
CONFIRM: http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx
FEDORA: https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html
XF: http://xforce.iss.net/xforce/xfdb/34869
SECTRACK: http://www.securitytracker.com/id?1018245
BID: http://www.securityfocus.com/bid/24476
REDHAT: http://www.redhat.com/support/errata/RHSA-2008-0261.html
REDHAT: http://www.redhat.com/support/errata/RHSA-2007-0569.html
MANDRIVA: http://www.mandriva.com/security/advisories?name=MDKSA-2007:241
FRSIRT: http://www.frsirt.com/english/advisories/2008/1981/references
FRSIRT: http://www.frsirt.com/english/advisories/2007/3386
FRSIRT: http://www.frsirt.com/english/advisories/2007/2213
CONFIRM: http://tomcat.apache.org/security-5.html
CONFIRM: http://tomcat.apache.org/security-4.html
CONFIRM: http://support.apple.com/kb/HT2163
SREASON: http://securityreason.com/securityalert/2804
SECUNIA: http://secunia.com/advisories/30802
SECUNIA: http://secunia.com/advisories/29392
SECUNIA: http://secunia.com/advisories/27727
SECUNIA: http://secunia.com/advisories/27037
SECUNIA: http://secunia.com/advisories/26076
SUSE: http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00008.html
APPLE: http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html
HP: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795