First published: Thu May 23 2019(Updated: )
The SSI printenv command echoes user provided data without escaping and is, therefore, vulnerable to XSS. SSI is disabled by default. The printenv command is intended for debugging and is unlikely to be present in a production website. Reference: <a href="http://tomcat.apache.org/security-9.html">http://tomcat.apache.org/security-9.html</a> Upstream commit: <a href="https://github.com/apache/tomcat/commit/15fcd16">https://github.com/apache/tomcat/commit/15fcd16</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Tomcat |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1713275 is considered low since the SSI printenv command is disabled by default and primarily used for debugging.
To fix REDHAT-BUG-1713275, ensure that the SSI printenv command is not enabled in your Apache Tomcat configuration.
REDHAT-BUG-1713275 is an XSS (Cross-Site Scripting) vulnerability due to the printenv command echoing user input without escaping.
REDHAT-BUG-1713275 is unlikely to affect production systems because the vulnerable SSI printenv command is disabled by default.
All versions of Apache Tomcat that support the SSI printenv command could potentially be affected by REDHAT-BUG-1713275 if this command is enabled.