Apache Tomcat “host-manager/html/add文件” 跨站脚本漏洞

漏洞信息详情

Apache Tomcat “host-manager/html/add文件” 跨站脚本漏洞

漏洞简介

Apache Tomcat是一个流行的开放源码的JSP应用服务器程序。

Apache Tomcat的host-manager/html/add文件没有正确地过滤对name参数的输入便返回给了用户,远程攻击者可以通过跨站脚本攻击在登录用户浏览器会话中执行任意HTML和脚本代码。

漏洞公告

目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:

http://jakarta.apache.org/tomcat/index.html

参考网址

来源:VUPEN

链接:http://www.vupen.com/english/advisories/2008/2823

来源:CONFIRM

链接:http://tomcat.apache.org/security-5.html

来源:SUSE

链接:http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html

来源:SECUNIA

链接:http://secunia.com/advisories/30592

来源:BID

链接:http://www.securityfocus.com/bid/31681

来源:VUPEN

链接:http://www.vupen.com/english/advisories/2008/2780

来源:REDHAT

链接:http://www.redhat.com/support/errata/RHSA-2008-0648.html

来源:REDHAT

链接:http://www.redhat.com/support/errata/RHSA-2008-0864.html

来源:MLIST

链接:http://marc.info/?l=tomcat-user&m=121244319501278&w=2

来源:BUGTRAQ

链接:http://www.securityfocus.com/archive/1/492958/100/0/threaded

来源:MLIST

链接:https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E

来源:FEDORA

链接:https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00889.html

来源:VUPEN

链接:http://www.vupen.com/english/advisories/2009/0320

来源:CONFIRM

链接:http://tomcat.apache.org/security-6.html

来源:MLIST

链接:https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E

来源:SECUNIA

链接:http://secunia.com/advisories/37460

来源:VUPEN

链接:http://www.vupen.com/english/advisories/2008/1725

来源:SECUNIA

链接:http://secunia.com/advisories/57126

来源:SECUNIA

链接:http://secunia.com/advisories/30500

来源:CONFIRM

链接:http://support.apple.com/kb/HT3216

来源:FEDORA

链接:https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00859.html

来源:BUGTRAQ

链接:http://www.securityfocus.com/archive/1/507985/100/0/threaded

来源:XF

链接:https://exchange.xforce.ibmcloud.com/vulnerabilities/42816

来源:SECUNIA

链接:http://secunia.com/advisories/31639

来源:OVAL

链接:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11534

来源:HP

链接:http://marc.info/?l=bugtraq&m=139344343412337&w=2

来源:VUPEN

链接:http://www.vupen.com/english/advisories/2009/3316

来源:OVAL

链接:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6009

来源:SECUNIA

链接:http://secunia.com/advisories/32120

来源:REDHAT

链接:http://www.redhat.com/support/errata/RHSA-2008-0862.html

来源:FEDORA

链接:https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00712.html

来源:CONFIRM

链接:http://www.vmware.com/security/advisories/VMSA-2009-0016.html

来源:APPLE

链接:http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html

来源:SECUNIA

链接:http://secunia.com/advisories/34013

来源:CONFIRM

链接:http://www.vmware.com/security/advisories/VMSA-2009-0002.html

来源:DEBIAN

链接:http://www.debian.org/security/2008/dsa-1593

来源:BID

链接:http://www.securityfocus.com/bid/29502

来源:SECUNIA

链接:http://secunia.com/advisories/31865

来源:MANDRIVA

链接:http://www.mandriva.com/security/advisories?name=MDVSA-2008:188

来源:HP

链接:http://marc.info/?l=bugtraq&m=123376588623823&w=2

来源:SECUNIA

链接:http://secunia.com/advisories/31891

来源:SECUNIA

链接:http://secunia.com/advisories/32222

来源:SECUNIA

链接:http://secunia.com/advisories/32266

来源:SECTRACK

链接:http://www.securitytracker.com/id?1020624

来源:SUSE

链接:http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html

来源:SECUNIA

链接:http://secunia.com/advisories/33797

来源:CONFIRM

链接:http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm

来源:VUPEN

链接:http://www.vupen.com/english/advisories/2009/0503

来源:SECUNIA

链接:http://secunia.com/advisories/33999

来源:SECUNIA

链接:http://secunia.com/advisories/30967

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享