Bug 396962 (CVE-2008-1947) - VUL-0: CVE-2008-1947: tomcat5: Tomcat host-manager XSS vulnerability
Summary: VUL-0: CVE-2008-1947: tomcat5: Tomcat host-manager XSS vulnerability
Status: RESOLVED FIXED
Alias: CVE-2008-1947
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P5 - None : Major
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL:
Whiteboard: patchinfos submitted (box only)
Keywords:
Depends on:
Blocks:
 
Reported: 2008-06-04 06:13 UTC by Thomas Biege
Modified: 2018-10-21 07:09 UTC (History)
1 user (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Thomas Biege 2008-06-04 06:13:05 UTC
Hi.
There is a security bug in 'tomcat5'.

This bug is public.

There is no coordinated release date (CRD) set.

More information can be found here:
	http://tomcat.apache.org/security.html

CVE number: CVE-2008-1947
CVE description: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1947


Original posting:



----------  Weitergeleitete Nachricht  ----------

Betreff: [SECURITY] CVE-2008-1947: Tomcat host-manager XSS vulnerability
Datum: Montag, 2. Juni 2008
Von: Mark Thomas <markt@apache.org>
An: Tomcat Users List <users@tomcat.apache.org>, Tomcat Developers List <dev@tomcat.apache.org>, bugtraq@securityfocus.com, full-disclosure@lists.grok.org.uk


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

CVE-2008-1947: Tomcat host-manager XSS vulnerability

Severity: Low

Vendor: The Apache Software Foundation

Versions Affected:
Tomcat 5.5.9 to 5.5.26
Tomcat 6.0.0 to 6.0.16
This issue has been fixed in the source repositories for each version and
will be included in 5.5.27 and 6.0.17. It is anticipated that these
versions will be released shortly.

Description:
The user supplied hostname attribute is not filtered before being included
in the output.

Mitigation:
Do not visit untrusted sites whilst logged in to the host-manager
application and log out (close the browser) once finished with the
host-manager.

Example:
Assume that after logged in, the victim was lead to the malicious web
server with following file installed.
<form action="http://localhost:8080/host-manager/html/add" method="get">
~  <INPUT TYPE="hidden" NAME='name' VALUE="<script>alert()</script>">
~  <INPUT TYPE="hidden" NAME='aliases' VALUE="somealias">
~  <input type="submit">
</form>

Credit:
These issues were discovered by Petr Splichal of RedHat.

References:
http://tomcat.apache.org/security.html

Mark Thomas
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkhEahEACgkQb7IeiTPGAkOQggCgirNfHSCkMDhcEzG6Ig1N0WzP
qesAoKXePHeBKaB0VzeBoowW5kvZpBQx
=4nQe
-----END PGP SIGNATURE-----

-------------------------------------------------------

-- 
Thomas Biege <thomas@novell.com>, SUSE LINUX, Security Support & Auditing
SUSE LINUX Products GmbH, GF: Markus Rex, HRB 16746 (AG Nuernberg)
Comment 1 Daniel Bornkessel 2008-06-10 12:55:30 UTC
Hi.
Please don't assign any Java bugs to me anymore ... Java packagers switched nearly a year ago ;)
Sorry for the late answer: I was not in the office
Comment 7 Michal Vyskocil 2008-06-27 13:26:16 UTC
Submitted fixed packages.

The tomcat6 (11.0) also contains the fix of bnc#403310
The tomcat55 (10.3) contains a fix for of bnc#334061
Comment 9 Thomas Biege 2008-06-27 14:22:28 UTC
MaintenanceTracker-18396
Comment 13 Thomas Biege 2008-07-03 16:19:02 UTC
packages released