CVE-2010-4172

Multiple cross-site scripting (XSS) vulnerabilities in the Manager application in Apache Tomcat 6.0.12 through 6.0.29 and 7.0.0 through 7.0.4 allow remote attackers to inject arbitrary web script or HTML via the (1) orderBy or (2) sort parameter to sessionsList.jsp, or unspecified input to (3) sessionDetail.jsp or (4) java/org/apache/catalina/manager/JspHelper.java, related to use of untrusted web applications.
References
Link Resource
http://archives.neohapsis.com/archives/fulldisclosure/2010-11/0285.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
http://marc.info/?l=bugtraq&m=139344343412337&w=2
http://secunia.com/advisories/42337 Vendor Advisory
http://secunia.com/advisories/43019
http://secunia.com/advisories/45022
http://secunia.com/advisories/57126
http://securitytracker.com/id?1024764
http://support.apple.com/kb/HT5002
http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5098550.html
http://svn.apache.org/viewvc?view=revision&revision=1037778
http://svn.apache.org/viewvc?view=revision&revision=1037779
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2011-0791.html
http://www.redhat.com/support/errata/RHSA-2011-0896.html
http://www.redhat.com/support/errata/RHSA-2011-0897.html
http://www.securityfocus.com/archive/1/514866/100/0/threaded
http://www.securityfocus.com/bid/45015 Exploit
http://www.ubuntu.com/usn/USN-1048-1
http://www.vupen.com/english/advisories/2010/3047 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0203
https://bugzilla.redhat.com/show_bug.cgi?id=656246
https://exchange.xforce.ibmcloud.com/vulnerabilities/63422
http://archives.neohapsis.com/archives/fulldisclosure/2010-11/0285.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
http://marc.info/?l=bugtraq&m=139344343412337&w=2
http://secunia.com/advisories/42337 Vendor Advisory
http://secunia.com/advisories/43019
http://secunia.com/advisories/45022
http://secunia.com/advisories/57126
http://securitytracker.com/id?1024764
http://support.apple.com/kb/HT5002
http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5098550.html
http://svn.apache.org/viewvc?view=revision&revision=1037778
http://svn.apache.org/viewvc?view=revision&revision=1037779
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2011-0791.html
http://www.redhat.com/support/errata/RHSA-2011-0896.html
http://www.redhat.com/support/errata/RHSA-2011-0897.html
http://www.securityfocus.com/archive/1/514866/100/0/threaded
http://www.securityfocus.com/bid/45015 Exploit
http://www.ubuntu.com/usn/USN-1048-1
http://www.vupen.com/english/advisories/2010/3047 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0203
https://bugzilla.redhat.com/show_bug.cgi?id=656246
https://exchange.xforce.ibmcloud.com/vulnerabilities/63422
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.17:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.18:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.19:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.20:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.24:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.26:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.27:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.28:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.29:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:*

History

21 Nov 2024, 01:20

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/fulldisclosure/2010-11/0285.html - () http://archives.neohapsis.com/archives/fulldisclosure/2010-11/0285.html -
References () http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html - () http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html -
References () http://marc.info/?l=bugtraq&m=139344343412337&w=2 - () http://marc.info/?l=bugtraq&m=139344343412337&w=2 -
References () http://secunia.com/advisories/42337 - Vendor Advisory () http://secunia.com/advisories/42337 - Vendor Advisory
References () http://secunia.com/advisories/43019 - () http://secunia.com/advisories/43019 -
References () http://secunia.com/advisories/45022 - () http://secunia.com/advisories/45022 -
References () http://secunia.com/advisories/57126 - () http://secunia.com/advisories/57126 -
References () http://securitytracker.com/id?1024764 - () http://securitytracker.com/id?1024764 -
References () http://support.apple.com/kb/HT5002 - () http://support.apple.com/kb/HT5002 -
References () http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5098550.html - () http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5098550.html -
References () http://svn.apache.org/viewvc?view=revision&revision=1037778 - () http://svn.apache.org/viewvc?view=revision&revision=1037778 -
References () http://svn.apache.org/viewvc?view=revision&revision=1037779 - () http://svn.apache.org/viewvc?view=revision&revision=1037779 -
References () http://tomcat.apache.org/security-6.html - () http://tomcat.apache.org/security-6.html -
References () http://tomcat.apache.org/security-7.html - Patch, Vendor Advisory () http://tomcat.apache.org/security-7.html - Patch, Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2011-0791.html - () http://www.redhat.com/support/errata/RHSA-2011-0791.html -
References () http://www.redhat.com/support/errata/RHSA-2011-0896.html - () http://www.redhat.com/support/errata/RHSA-2011-0896.html -
References () http://www.redhat.com/support/errata/RHSA-2011-0897.html - () http://www.redhat.com/support/errata/RHSA-2011-0897.html -
References () http://www.securityfocus.com/archive/1/514866/100/0/threaded - () http://www.securityfocus.com/archive/1/514866/100/0/threaded -
References () http://www.securityfocus.com/bid/45015 - Exploit () http://www.securityfocus.com/bid/45015 - Exploit
References () http://www.ubuntu.com/usn/USN-1048-1 - () http://www.ubuntu.com/usn/USN-1048-1 -
References () http://www.vupen.com/english/advisories/2010/3047 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/3047 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2011/0203 - () http://www.vupen.com/english/advisories/2011/0203 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=656246 - () https://bugzilla.redhat.com/show_bug.cgi?id=656246 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/63422 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/63422 -

Information

Published : 2010-11-26 20:00

Updated : 2024-11-21 01:20


NVD link : CVE-2010-4172

Mitre link : CVE-2010-4172

CVE.ORG link : CVE-2010-4172


JSON object : View

Products Affected

apache

  • tomcat
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')