First published: Wed Aug 27 2008(Updated: )
Apache Tomcat is a servlet container for the Java Servlet and JavaServer<br>Pages (JSP) technologies.<br>A cross-site scripting vulnerability was discovered in the<br>HttpServletResponse.sendError() method. A remote attacker could inject<br>arbitrary web script or HTML via forged HTTP headers. (CVE-2008-1232)<br>An additional cross-site scripting vulnerability was discovered in the host<br>manager application. A remote attacker could inject arbitrary web script or<br>HTML via the hostname parameter. (CVE-2008-1947)<br>A traversal vulnerability was discovered when using a RequestDispatcher<br>in combination with a servlet or JSP. A remote attacker could utilize a<br>specially-crafted request parameter to access protected web resources.<br>(CVE-2008-2370)<br>An additional traversal vulnerability was discovered when the<br>"allowLinking" and "URIencoding" settings were activated. A remote attacker<br>could use a UTF-8-encoded request to extend their privileges and obtain<br>local files accessible to the Tomcat process. (CVE-2008-2938)<br>Users of tomcat should upgrade to these updated packages, which contain<br>backported patches to resolve these issues.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/tomcat5 | <5.5.23-0jpp.7.el5_2.1 | 5.5.23-0jpp.7.el5_2.1 |
redhat/tomcat5 | <5.5.23-0jpp.7.el5_2.1 | 5.5.23-0jpp.7.el5_2.1 |
redhat/tomcat5-admin-webapps | <5.5.23-0jpp.7.el5_2.1 | 5.5.23-0jpp.7.el5_2.1 |
redhat/tomcat5-common-lib | <5.5.23-0jpp.7.el5_2.1 | 5.5.23-0jpp.7.el5_2.1 |
redhat/tomcat5-jasper | <5.5.23-0jpp.7.el5_2.1 | 5.5.23-0jpp.7.el5_2.1 |
redhat/tomcat5-jasper-javadoc | <5.5.23-0jpp.7.el5_2.1 | 5.5.23-0jpp.7.el5_2.1 |
redhat/tomcat5-jsp | <2.0-api-5.5.23-0jpp.7.el5_2.1 | 2.0-api-5.5.23-0jpp.7.el5_2.1 |
redhat/tomcat5-jsp | <2.0-api-javadoc-5.5.23-0jpp.7.el5_2.1 | 2.0-api-javadoc-5.5.23-0jpp.7.el5_2.1 |
redhat/tomcat5-server-lib | <5.5.23-0jpp.7.el5_2.1 | 5.5.23-0jpp.7.el5_2.1 |
redhat/tomcat5-servlet | <2.4-api-5.5.23-0jpp.7.el5_2.1 | 2.4-api-5.5.23-0jpp.7.el5_2.1 |
redhat/tomcat5-servlet | <2.4-api-javadoc-5.5.23-0jpp.7.el5_2.1 | 2.4-api-javadoc-5.5.23-0jpp.7.el5_2.1 |
redhat/tomcat5-webapps | <5.5.23-0jpp.7.el5_2.1 | 5.5.23-0jpp.7.el5_2.1 |
redhat/tomcat5-admin-webapps | <5.5.23-0jpp.7.el5_2.1 | 5.5.23-0jpp.7.el5_2.1 |
redhat/tomcat5-common-lib | <5.5.23-0jpp.7.el5_2.1 | 5.5.23-0jpp.7.el5_2.1 |
redhat/tomcat5-jasper | <5.5.23-0jpp.7.el5_2.1 | 5.5.23-0jpp.7.el5_2.1 |
redhat/tomcat5-jasper-javadoc | <5.5.23-0jpp.7.el5_2.1 | 5.5.23-0jpp.7.el5_2.1 |
redhat/tomcat5-jsp | <2.0-api-5.5.23-0jpp.7.el5_2.1 | 2.0-api-5.5.23-0jpp.7.el5_2.1 |
redhat/tomcat5-jsp | <2.0-api-javadoc-5.5.23-0jpp.7.el5_2.1 | 2.0-api-javadoc-5.5.23-0jpp.7.el5_2.1 |
redhat/tomcat5-server-lib | <5.5.23-0jpp.7.el5_2.1 | 5.5.23-0jpp.7.el5_2.1 |
redhat/tomcat5-servlet | <2.4-api-5.5.23-0jpp.7.el5_2.1 | 2.4-api-5.5.23-0jpp.7.el5_2.1 |
redhat/tomcat5-servlet | <2.4-api-javadoc-5.5.23-0jpp.7.el5_2.1 | 2.4-api-javadoc-5.5.23-0jpp.7.el5_2.1 |
redhat/tomcat5-webapps | <5.5.23-0jpp.7.el5_2.1 | 5.5.23-0jpp.7.el5_2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.