bugtraq June 2008 archive
Main Archive Page > Month Archives  > bugtraq archives
bugtraq: [SECURITY] CVE-2008-1947: Tomcat host-manager XSS vulne

[SECURITY] CVE-2008-1947: Tomcat host-manager XSS vulnerability

From: Mark Thomas <markt_at_nospam>
Date: Mon Jun 02 2008 - 21:45:53 GMT
To: Tomcat Users List <users@tomcat.apache.org>, Tomcat Developers List <dev@tomcat.apache.org>, bugtraq@securityfocus.com, full-disclosure@lists.grok.org.uk

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

CVE-2008-1947: Tomcat host-manager XSS vulnerability

Severity: Low

Vendor: The Apache Software Foundation

Versions Affected:
Tomcat 5.5.9 to 5.5.26
Tomcat 6.0.0 to 6.0.16
This issue has been fixed in the source repositories for each version and will be included in 5.5.27 and 6.0.17. It is anticipated that these versions will be released shortly.

Description:
The user supplied hostname attribute is not filtered before being included in the output.

Mitigation:
Do not visit untrusted sites whilst logged in to the host-manager application and log out (close the browser) once finished with the host-manager.

Example:
Assume that after logged in, the victim was lead to the malicious web server with following file installed.
<form action="http://localhost:8080/host-manager/html/add" method="get">
~ <INPUT TYPE="hidden" NAME='name' VALUE="<script>alert()</script>">
~ <INPUT TYPE="hidden" NAME='aliases' VALUE="somealias">
~ <input type="submit">

</form>

Credit:
These issues were discovered by Petr Splichal of RedHat.

References:
http://tomcat.apache.org/security.html

Mark Thomas
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkhEahEACgkQb7IeiTPGAkOQggCgirNfHSCkMDhcEzG6Ig1N0WzP qesAoKXePHeBKaB0VzeBoowW5kvZpBQx
=4nQe
-----END PGP SIGNATURE-----