First published: Fri Mar 06 2009(Updated: )
Quoting the upstream advisory: The calendar application in the examples contains invalid HTML which renders the XSS protection for the time parameter ineffective. An attacker can therefore perform an XSS attack using the time attribute. Mitigation: 6.0.x users should do one of the following: - remove the examples web application - apply this patch <a href="http://svn.apache.org/viewvc?rev=750924&view=rev">http://svn.apache.org/viewvc?rev=750924&view=rev</a> - upgrade to 6.0.19 when released 5.5.x users should do one of the following: - remove the examples web application - apply this patch <a href="http://svn.apache.org/viewvc?rev=750928&view=rev">http://svn.apache.org/viewvc?rev=750928&view=rev</a> - upgrade to 5.5.28 when released 4.1.x users should do one of the following: - remove the examples web application - apply this patch <a href="http://svn.apache.org/viewvc?rev=750927&view=rev">http://svn.apache.org/viewvc?rev=750927&view=rev</a> - upgrade to 4.1.40 when released Example: <a href="http://localhost:8080/examples/jsp/cal/cal2.jsp?time=8am%20STYLE=xss:e/**/xpression(try{a=firstTime}catch(e){firstTime=1;alert('XSS">http://localhost:8080/examples/jsp/cal/cal2.jsp?time=8am%20STYLE=xss:e/**/xpression(try{a=firstTime}catch(e){firstTime=1;alert('XSS</a>')}); Credit: This issue was discovered by Deniz Cevik. References: <a href="http://tomcat.apache.org/security.html">http://tomcat.apache.org/security.html</a> <a href="http://tomcat.apache.org/security-6.html">http://tomcat.apache.org/security-6.html</a> <a href="http://tomcat.apache.org/security-5.html">http://tomcat.apache.org/security-5.html</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Tomcat | >=6.0.0<=6.0.19>=5.5.0<=5.5.28>=4.1.0<=4.1.40 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-489028 is considered high due to its potential for Cross-Site Scripting (XSS) attacks.
To fix REDHAT-BUG-489028, users should ensure they update to a secure version of Apache Tomcat that addresses the invalid HTML issue.
The affected applications include Apache Tomcat versions 6.0.x, 5.5.x, and 4.1.x due to the vulnerable calendar application.
The nature of the vulnerability in REDHAT-BUG-489028 is that it allows for Cross-Site Scripting (XSS) via an ineffective protection mechanism on the time parameter.
Yes, an attacker can exploit REDHAT-BUG-489028 without requiring authentication, making it more critical to address.