CVE-2005-4838
Severity CVSS v4.0:
Pending analysis
Type:
CWE-79
Cross-Site Scripting (XSS)
Publication date:
31/12/2005
Last modified:
03/04/2025
Description
Multiple cross-site scripting (XSS) vulnerabilities in the example web applications for Jakarta Tomcat 5.5.6 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) el/functions.jsp, (2) el/implicit-objects.jsp, and (3) jspx/textRotate.jspx in examples/jsp2/, as demonstrated via script in a request to snp/snoop.jsp. NOTE: other XSS issues in the manager were simultaneously reported, but these require admin access and do not cross privilege boundaries.
Impact
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* | 5.5.6 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065598.html
- http://marc.info/?l=tomcat-dev&m=110476790331536&w=2
- http://marc.info/?l=tomcat-dev&m=110477195116951&w=2
- http://rhn.redhat.com/errata/RHSA-2008-0630.html
- http://secunia.com/advisories/13737
- http://secunia.com/advisories/31493
- http://securitytracker.com/id?1012793=
- http://tomcat.apache.org/security-4.html
- http://tomcat.apache.org/security-5.html
- http://www.oliverkarow.de/research/jakarta556_xss.txt
- http://www.osvdb.org/12721
- http://www.osvdb.org/34878
- http://www.osvdb.org/34879
- http://www.redhat.com/support/errata/RHSA-2008-0261.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/36467
- https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E
- http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065598.html
- http://marc.info/?l=tomcat-dev&m=110476790331536&w=2
- http://marc.info/?l=tomcat-dev&m=110477195116951&w=2
- http://rhn.redhat.com/errata/RHSA-2008-0630.html
- http://secunia.com/advisories/13737
- http://secunia.com/advisories/31493
- http://securitytracker.com/id?1012793=
- http://tomcat.apache.org/security-4.html
- http://tomcat.apache.org/security-5.html
- http://www.oliverkarow.de/research/jakarta556_xss.txt
- http://www.osvdb.org/12721
- http://www.osvdb.org/34878
- http://www.osvdb.org/34879
- http://www.redhat.com/support/errata/RHSA-2008-0261.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/36467
- https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E