Apache Tomcat /servlet Mapping XSS

medium Nessus Plugin ID 11041

Synopsis

The remote web server is affected by a cross-site scripting issue.

Description

Apache Tomcat is the servlet container that is used in the official Reference Implementation for the Java Servlet and JavaServer Pages technologies.

By using the /servlet/ mapping to invoke various servlets / classes it is possible to cause Tomcat to throw an exception, allowing XSS attacks.

Solution

The 'invoker' servlet (mapped to /servlet/), which executes anonymous servlet classes that have not been defined in a web.xml file should be unmapped.

The entry for this can be found in the /tomcat-install-dir/conf/web.xml file.

See Also

https://www.westpoint.ltd.uk/advisories/wp-02-0008.txt

Plugin Details

Severity: Medium

ID: 11041

File Name: apache_Tomcat_Servlet_XSS.nasl

Version: 1.40

Type: remote

Published: 7/10/2002

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: cpe:/a:apache:tomcat

Required KB Items: www/tomcat

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Vulnerability Publication Date: 7/10/2002

Reference Information

CVE: CVE-2002-0682

BID: 5193

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990