Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 182262 - www-servers/tomcat XSS vulnerabilities in the JSP examples (CVE-2007-3386)
Summary: www-servers/tomcat XSS vulnerabilities in the JSP examples (CVE-2007-3386)
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High trivial (vote)
Assignee: Gentoo Security
URL: http://cve.mitre.org/cgi-bin/cvename....
Whiteboard: C4 [noglsa] jaervosz
Keywords:
Depends on:
Blocks:
 
Reported: 2007-06-16 21:05 UTC by Emanuele Gentili
Modified: 2007-10-12 01:10 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Emanuele Gentili 2007-06-16 21:05:07 UTC
The JSP examples web application displays does not escape some user
provided data before including it in the output. This enables a XSS
attack.

Reproducible: Always

Steps to Reproduce:
1. Undeploy the examples web application(s).

Example:
http://host:port/jsp-examples/snp/snoop.jsp;<script>alert()</script>test.jsp
Comment 1 Emanuele Gentili 2007-06-16 21:05:47 UTC
Versions Affected:
Tomcat 4.0.0 to 4.0.6
Tomcat 4.1.0 to 4.1.36
Tomcat 5.0.0 to 5.0.30
Tomcat 5.5.0 to 5.5.24
Tomcat 6.0.0 to 6.0.13
Comment 2 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-06-16 22:03:57 UTC
java please advise.
Comment 3 William L. Thomson Jr. (RETIRED) gentoo-dev 2007-06-16 22:16:52 UTC
We do not enable the examples USE flag by default. So by default they are not installed. Really only people new to Tomcat will set and use that flag. I would be surprised if many using it in production or an env where it's likely to be exploited have the examples USE flag set.

There is also an exploit in the manager app
http://cve.mitre.org/cgi-bin/cvename.cgi?name=2007-2450

But that requires log in to exploit. Being as how upstream nor us provides a default log in. That's also a pretty far off exploit.

I guess like upstream we can deem both to be low severity. Not sure if we need to do anything specific. Other than announce it and warn users. Guess we could disable examples USE flag as an extreme.

I can add pkg_postinst messages warning when examples is set. Manager webapp is likely used more often.
Comment 4 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-06-17 08:07:27 UTC
I guess a small warning in the ebuild output should be enough.
Comment 5 William L. Thomson Jr. (RETIRED) gentoo-dev 2007-06-17 15:54:56 UTC
Ok I added a warning to pkg_postinst about both exploits. Also provided links to both so users can be informed. Should be good to go there. Just need an announcement or etc, then security can close bug per normal procedures.
Comment 6 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-06-23 18:05:37 UTC
This one is ready for GLSA decision. I vote NO.
Comment 7 Matt Drew (RETIRED) gentoo-dev 2007-06-25 14:00:24 UTC
I also vote NO.