发布时间 :2001-12-06 00:00:00
修订时间 :2008-09-10 15:09:02

[原文]A cross-site scripting vulnerability in Apache Tomcat 3.2.1 allows a malicious webmaster to embed Javascript in a request for a .JSP file, which causes the Javascript to be inserted into an error message.

[CNNVD]Apache Tomcat跨站脚本漏洞(CNNVD-200112-026)

        Apache Tomcat 3.2.1版本存在跨站脚本漏洞。恶意网络管理员在.JSP文件请求中嵌入Javascript,该漏洞导致Javascript插入到出错消息中。

- CVSS (基础分值)

CVSS分值: 5.1 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: HIGH [漏洞利用存在特定的访问条件]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BUGTRAQ  20010702 Multiple Vendor Java Servlet Container Cross-Site Scripting Vulnerability

- 漏洞信息

Apache Tomcat跨站脚本漏洞
中危 跨站脚本
2001-12-06 00:00:00 2006-04-07 00:00:00
        Apache Tomcat 3.2.1版本存在跨站脚本漏洞。恶意网络管理员在.JSP文件请求中嵌入Javascript,该漏洞导致Javascript插入到出错消息中。

- 公告与补丁

        It has been suggested that this issue is rectified in versions 4.0-beta-2 and 3.2.2-beta-5 of Tomcat, although this has not been directly confirmed by the vendor.

- 漏洞信息

Apache Tomcat Java Servlet Error Page XSS
Remote / Network Access Input Manipulation
Loss of Integrity Upgrade
Exploit Public Vendor Verified, Third-party Verified

- 漏洞描述

Apache Tomcat contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate user input upon submission to the Java Servlet which is in turn passed to the error handler. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

- 时间线

2001-07-02 2001-07-02
2001-07-02 2001-11-13

- 解决方案

Upgrade to the latest version, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Apache Tomcat Cross-Site Scripting Vulnerability
Input Validation Error 2982
Yes No
2001-07-02 12:00:00 2009-07-11 06:56:00
Discovered and posted to Bugtraq by TAKAGI, Hiromitsu <> on July 2, 2001.

- 受影响的程序版本

Apache Software Foundation Tomcat 3.2.1
- Caldera OpenLinux 2.4
- Conectiva Linux 5.1
- Debian Linux 2.2
- Debian Linux 2.1
- Digital UNIX 4.0
- FreeBSD FreeBSD 5.0
- FreeBSD FreeBSD 4.0
- HP Secure OS software for Linux 1.0
- Mandriva Linux Mandrake 7.1
- Mandriva Linux Mandrake 7.0
- NetBSD NetBSD 1.4.2 x86
- NetBSD NetBSD 1.4.1 x86
- RedHat Linux 6.2 i386
- RedHat Linux 6.1 i386
- SGI IRIX 6.5
- SGI IRIX 6.4
- Sun Solaris 8_sparc
- Sun Solaris 7.0

- 漏洞讨论

Apache Tomcat does not filter script embedding from links that are displayed on a server's website. A malicious webmaster can exploit this vulnerability to cause JavaScript commands or embedded scripts to be executed by any user who clicks on the hyper-link. Upon clicking on the hyper-link, Tomcat will generate an error message including the specified or embedded script. The specified or embedded scripting will be executed in the client's browser and treated as content originating from the target server returning the error message (even though the scripting may have originated at another site entirely).

- 漏洞利用

TAKAGI, Hiromitsu provided the following example in his BugTraq posting:


- 解决方案

It has been suggested that this issue is rectified in versions 4.0-beta-2 and 3.2.2-beta-5 of Tomcat, although this has not been directly confirmed by the vendor.

- 相关参考