CVE-2009-0781

MEDIUM
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the calendar application in the examples web application in Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 allows remote attackers to inject arbitrary web script or HTML via the time parameter, related to "invalid HTML."

References

http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html

http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html

http://marc.info/?l=bugtraq&m=127420533226623&w=2

http://marc.info/?l=bugtraq&m=129070310906557&w=2

http://marc.info/?l=bugtraq&m=133469267822771&w=2

http://marc.info/?l=bugtraq&m=136485229118404&w=2

http://secunia.com/advisories/35685

http://secunia.com/advisories/35788

http://secunia.com/advisories/37460

http://secunia.com/advisories/42368

http://sunsolve.sun.com/search/document.do?assetkey=1-26-263529-1

http://support.apple.com/kb/HT4077

http://tomcat.apache.org/security-4.html

http://tomcat.apache.org/security-5.html

http://tomcat.apache.org/security-6.html

http://www.debian.org/security/2011/dsa-2207

http://www.mandriva.com/security/advisories?name=MDVSA-2009:136

http://www.mandriva.com/security/advisories?name=MDVSA-2009:138

http://www.securityfocus.com/archive/1/501538/100/0/threaded

http://www.securityfocus.com/archive/1/507985/100/0/threaded

http://www.vmware.com/security/advisories/VMSA-2009-0016.html

http://www.vupen.com/english/advisories/2009/1856

http://www.vupen.com/english/advisories/2009/3316

http://www.vupen.com/english/advisories/2010/3056

https://exchange.xforce.ibmcloud.com/vulnerabilities/49213

https://lists.apache.org/thread.html/[email protected]%3Cdev.tomcat.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.tomcat.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.tomcat.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.tomcat.apache.org%3E

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11041

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19345

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6564

https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01156.html

https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01216.html

https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01246.html

Details

Source: MITRE

Published: 2009-03-09

Updated: 2019-03-25

Type: CWE-79

Risk Information

CVSS v2

Base Score: 4.3

Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Impact Score: 2.9

Exploitability Score: 8.6

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:apache:tomcat:4.1.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.3:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.3:beta:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.4:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.5:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.6:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.7:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.8:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.9:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.9:beta:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.10:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.11:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.12:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.13:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.14:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.15:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.16:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.17:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.18:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.19:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.20:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.21:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.22:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.23:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.24:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.25:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.26:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.27:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.28:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.29:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.30:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.31:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.32:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.33:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.34:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.35:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.36:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.37:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.25:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.26:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:*

Tenable Plugins

View all (33 total)

IDNameProductFamilySeverity
89117VMware ESX / ESXi Multiple Vulnerabilities (VMSA-2009-0016) (remote check)NessusMisc.
critical
68076Oracle Linux 5 : tomcat5 (ELSA-2010-0580)NessusOracle Linux Local Security Checks
medium
67895Oracle Linux 5 : tomcat (ELSA-2009-1164)NessusOracle Linux Local Security Checks
medium
60828Scientific Linux Security Update : tomcat5 on SL5.x i386/x86_64NessusScientific Linux Local Security Checks
medium
60621Scientific Linux Security Update : tomcat on SL5.x i386/x86_64NessusScientific Linux Local Security Checks
medium
59677GLSA-201206-24 : Apache Tomcat: Multiple vulnerabilitiesNessusGentoo Local Security Checks
medium
53212Debian DSA-2207-1 : tomcat5.5 - several vulnerabilitiesNessusDebian Local Security Checks
medium
52690SuSE 11 Security Update : Websphere Community Edition (SAT Patch Number 1016)NessusSuSE Local Security Checks
high
48231RHEL 5 : tomcat5 (RHSA-2010:0580)NessusRed Hat Local Security Checks
medium
48218CentOS 5 : tomcat5 (CESA-2010:0580)NessusCentOS Local Security Checks
medium
46753Apache Tomcat < 4.1.40 / 5.5.28 / 6.0.20 Multiple VulnerabilitiesNessusWeb Servers
medium
5489Mac OS X < 10.6.3 Multiple VulnerabilitiesNessus Network MonitorGeneric
critical
45373Mac OS X Multiple Vulnerabilities (Security Update 2010-002)NessusMacOS X Local Security Checks
critical
45372Mac OS X 10.6.x < 10.6.3 Multiple VulnerabilitiesNessusMacOS X Local Security Checks
critical
43770CentOS 5 : tomcat (CESA-2009:1164)NessusCentOS Local Security Checks
medium
42903Fedora 11 : tomcat6-6.0.20-1.fc11 (2009-11374)NessusFedora Local Security Checks
medium
42902Fedora 10 : tomcat6-6.0.20-1.fc10 (2009-11356)NessusFedora Local Security Checks
medium
42901Fedora 12 : tomcat6-6.0.20-1.fc12 (2009-11352)NessusFedora Local Security Checks
medium
42870VMSA-2009-0016 : VMware vCenter and ESX update release and vMA patch release address multiple security issues in third party components.NessusVMware ESX Local Security Checks
medium
42037openSUSE 10 Security Update : tomcat55 (tomcat55-6369)NessusSuSE Local Security Checks
medium
41597SuSE 10 Security Update : Websphere Community Edition (ZYPP Patch Number 6312)NessusSuSE Local Security Checks
high
41592SuSE 10 Security Update : Tomcat 5 (ZYPP Patch Number 6352)NessusSuSE Local Security Checks
medium
41458SuSE 11 Security Update : Websphere Community Edition (SAT Patch Number 1016)NessusSuSE Local Security Checks
high
41314SuSE9 Security Update : Tomcat (YOU Patch Number 12460)NessusSuSE Local Security Checks
medium
40342RHEL 5 : tomcat (RHSA-2009:1164)NessusRed Hat Local Security Checks
medium
40316openSUSE Security Update : tomcat6 (tomcat6-999)NessusSuSE Local Security Checks
medium
40144openSUSE Security Update : tomcat6 (tomcat6-999)NessusSuSE Local Security Checks
medium
39486Mandriva Linux Security Advisory : tomcat5 (MDVSA-2009:138)NessusMandriva Local Security Checks
medium
39485Mandriva Linux Security Advisory : tomcat5 (MDVSA-2009:136)NessusMandriva Local Security Checks
medium
39419Ubuntu 8.10 / 9.04 : tomcat6 vulnerabilities (USN-788-1)NessusUbuntu Local Security Checks
medium
35806Tomcat Sample App cal2.jsp 'time' Parameter XSSNessusCGI abuses : XSS
medium
4501Apache Tomcat Sample App cal2.jsp time Parameter XSS (CVE-2009-0781)Nessus Network MonitorWeb Servers
medium
800603Apache Tomcat Sample App cal2.jsp time Parameter XSS (CVE-2009-0781)Log Correlation EngineWeb Servers
medium