First published: Thu Apr 19 2007(Updated: )
According to <a href="http://tomcat.apache.org/security-5.html">http://tomcat.apache.org/security-5.html</a> Fixed in Apache Tomcat 5.5.18 Cross-site scripting <a href="https://access.redhat.com/security/cve/CVE-2006-7195">CVE-2006-7195</a> The implict-objects.jsp in the examples webapp displayed a number of unfiltered header values. This enabled a XSS attack. These values are now filtered. Affects: 5.0.0-5.0.HEAD, 5.5.0-5.5.17
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Tomcat | =5.0.19 | |
Apache Tomcat | =5.5.12 | |
Apache Tomcat | =5.0.14 | |
Apache Tomcat | =5.5.14 | |
Apache Tomcat | =5.5.10 | |
Apache Tomcat | =5.0.22 | |
Apache Tomcat | =5.5.7 | |
Apache Tomcat | =5.5.11 | |
Apache Tomcat | =5.5.6 | |
Apache Tomcat | =5.0.15 | |
Apache Tomcat | =5.0.30 | |
Apache Tomcat | =5.5.15 | |
Apache Tomcat | =5.0.23 | |
Apache Tomcat | =5.0.2 | |
Apache Tomcat | =5.5.5 | |
Apache Tomcat | =5.0.10 | |
Apache Tomcat | =5.0.21 | |
Apache Tomcat | =5.0.26 | |
Apache Tomcat | =5.0.0 | |
Apache Tomcat | =5.0.27 | |
Apache Tomcat | =5.0.16 | |
Apache Tomcat | =5.5.9 | |
Apache Tomcat | =5.0.18 | |
Apache Tomcat | =5.0.28 | |
Apache Tomcat | =5.0.29 | |
Apache Tomcat | =5.5.0 | |
Apache Tomcat | =5.5.13 | |
Apache Tomcat | =5.0.13 | |
Apache Tomcat | =5.5.8 | |
Apache Tomcat | =5.0.17 | |
Apache Tomcat | =5.5.16 | |
Apache Tomcat | =5.5.17 | |
Apache Tomcat | =5.0.25 | |
Apache Tomcat | =5.0.1 | |
Apache Tomcat | =5.0.11 | |
Apache Tomcat | =5.0.24 | |
Apache Tomcat | =5.0.12 | |
redhat/jakarta-commons-modeler | <0:1.1-8jpp.1.0.2.el5 | 0:1.1-8jpp.1.0.2.el5 |
redhat/tomcat5 | <0:5.5.23-0jpp.1.0.3.el5 | 0:5.5.23-0jpp.1.0.3.el5 |
redhat/java | <1.4.2-ibm-0:1.4.2.10-1jpp.2.el4 | 1.4.2-ibm-0:1.4.2.10-1jpp.2.el4 |
redhat/rhn-apache | <0:1.3.27-36.rhn.rhel4 | 0:1.3.27-36.rhn.rhel4 |
redhat/rhn-modjk | <0:1.2.23-2rhn.rhel4 | 0:1.2.23-2rhn.rhel4 |
redhat/rhn-modperl | <0:1.29-16.rhel4 | 0:1.29-16.rhel4 |
redhat/rhn-modssl | <0:2.8.12-8.rhn.10.rhel4 | 0:2.8.12-8.rhn.10.rhel4 |
redhat/java | <1.4.2-ibm-0:1.4.2.10-1jpp.2.el3 | 1.4.2-ibm-0:1.4.2.10-1jpp.2.el3 |
redhat/rhn-apache | <0:1.3.27-36.rhn.rhel3 | 0:1.3.27-36.rhn.rhel3 |
redhat/rhn-modjk | <0:1.2.23-2rhn.rhel3 | 0:1.2.23-2rhn.rhel3 |
redhat/rhn-modperl | <0:1.29-16.rhel3 | 0:1.29-16.rhel3 |
redhat/rhn-modssl | <0:2.8.12-8.rhn.10.rhel3 | 0:2.8.12-8.rhn.10.rhel3 |
maven/org.apache.tomcat:tomcat | >=5.5.0<=5.5.17 | 5.5.18 |
maven/org.apache.tomcat:tomcat | >=5.0.0<=5.0.30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)