Apache Tomcat 7.0.x < 7.0.5 Multiple XSS

medium Nessus Network Monitor Plugin ID 5793

Synopsis

The remote web server is affected by a cross-site scripting vulnerability.

Description

According to its self-reported version number, the instance of Apache Tomcat listening on the remote host is 7.x prior to 7.0.5. It is, therefore, affected by multiple cross-site scripting vulnerabilities in the Tomcat Manager application's 'sessionList.jsp' file. The 'sort' and 'orderby' parameters are not properly sanitized before being returned to the user and can be used to inject arbitrary script into the user's browser.

Note that Nessus Network Monitor has not tested for these issues but has instead relied only on the application's self-reported version number.

Also note, successful exploitation requires that the cross-site request forgery (CSRF) filter is disabled.

Solution

Upgrade to Apache Tomcat 7.0.5 or later.

See Also

http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.5

Plugin Details

Severity: Medium

ID: 5793

Family: Web Servers

Published: 2/13/2011

Updated: 3/6/2019

Nessus ID: 51526

Risk Information

VPR

Risk Factor: Low

Score: 2.9

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: cpe:/a:apache:tomcat

Patch Publication Date: 1/13/2011

Vulnerability Publication Date: 11/22/2010

Reference Information

CVE: CVE-2010-4172

BID: 45015