CVE-2005-4838
Gravedad CVSS v2.0:
MEDIA
Tipo:
CWE-79
Neutralización incorrecta de la entrada durante la generación de la página web (Cross-site Scripting)
Fecha de publicación:
31/12/2005
Última modificación:
03/04/2025
Descripción
*** Pendiente de traducción *** Multiple cross-site scripting (XSS) vulnerabilities in the example web applications for Jakarta Tomcat 5.5.6 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) el/functions.jsp, (2) el/implicit-objects.jsp, and (3) jspx/textRotate.jspx in examples/jsp2/, as demonstrated via script in a request to snp/snoop.jsp. NOTE: other XSS issues in the manager were simultaneously reported, but these require admin access and do not cross privilege boundaries.
Impacto
Puntuación base 2.0
4.30
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* | 5.5.6 (incluyendo) |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065598.html
- http://marc.info/?l=tomcat-dev&m=110476790331536&w=2
- http://marc.info/?l=tomcat-dev&m=110477195116951&w=2
- http://rhn.redhat.com/errata/RHSA-2008-0630.html
- http://secunia.com/advisories/13737
- http://secunia.com/advisories/31493
- http://securitytracker.com/id?1012793=
- http://tomcat.apache.org/security-4.html
- http://tomcat.apache.org/security-5.html
- http://www.oliverkarow.de/research/jakarta556_xss.txt
- http://www.osvdb.org/12721
- http://www.osvdb.org/34878
- http://www.osvdb.org/34879
- http://www.redhat.com/support/errata/RHSA-2008-0261.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/36467
- https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E
- http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065598.html
- http://marc.info/?l=tomcat-dev&m=110476790331536&w=2
- http://marc.info/?l=tomcat-dev&m=110477195116951&w=2
- http://rhn.redhat.com/errata/RHSA-2008-0630.html
- http://secunia.com/advisories/13737
- http://secunia.com/advisories/31493
- http://securitytracker.com/id?1012793=
- http://tomcat.apache.org/security-4.html
- http://tomcat.apache.org/security-5.html
- http://www.oliverkarow.de/research/jakarta556_xss.txt
- http://www.osvdb.org/12721
- http://www.osvdb.org/34878
- http://www.osvdb.org/34879
- http://www.redhat.com/support/errata/RHSA-2008-0261.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/36467
- https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E