漏洞信息详情
Apache Tomcat “host-manager/html/add文件” 跨站脚本漏洞
- CNNVD编号:CNNVD-200806-068
- 危害等级: 中危
- CVE编号:
CVE-2008-1947
- 漏洞类型:
跨站脚本
- 发布时间:
2007-05-16
- 威胁类型:
远程
- 更新时间:
2019-04-02
- 厂 商:
apache - 漏洞来源:
Petr Splichal -
漏洞简介
Apache Tomcat是一个流行的开放源码的JSP应用服务器程序。
Apache Tomcat的host-manager/html/add文件没有正确地过滤对name参数的输入便返回给了用户,远程攻击者可以通过跨站脚本攻击在登录用户浏览器会话中执行任意HTML和脚本代码。
参考网址
来源:VUPEN
链接:http://www.vupen.com/english/advisories/2008/2823
来源:CONFIRM
链接:http://tomcat.apache.org/security-5.html
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
来源:SECUNIA
链接:http://secunia.com/advisories/30592
来源:BID
链接:http://www.securityfocus.com/bid/31681
来源:VUPEN
链接:http://www.vupen.com/english/advisories/2008/2780
来源:REDHAT
链接:http://www.redhat.com/support/errata/RHSA-2008-0648.html
来源:REDHAT
链接:http://www.redhat.com/support/errata/RHSA-2008-0864.html
来源:MLIST
链接:http://marc.info/?l=tomcat-user&m=121244319501278&w=2
来源:BUGTRAQ
链接:http://www.securityfocus.com/archive/1/492958/100/0/threaded
来源:MLIST
来源:FEDORA
链接:https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00889.html
来源:VUPEN
链接:http://www.vupen.com/english/advisories/2009/0320
来源:CONFIRM
链接:http://tomcat.apache.org/security-6.html
来源:MLIST
来源:SECUNIA
链接:http://secunia.com/advisories/37460
来源:VUPEN
链接:http://www.vupen.com/english/advisories/2008/1725
来源:SECUNIA
链接:http://secunia.com/advisories/57126
来源:SECUNIA
链接:http://secunia.com/advisories/30500
来源:CONFIRM
链接:http://support.apple.com/kb/HT3216
来源:FEDORA
链接:https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00859.html
来源:BUGTRAQ
链接:http://www.securityfocus.com/archive/1/507985/100/0/threaded
来源:XF
链接:https://exchange.xforce.ibmcloud.com/vulnerabilities/42816
来源:SECUNIA
链接:http://secunia.com/advisories/31639
来源:OVAL
链接:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11534
来源:HP
链接:http://marc.info/?l=bugtraq&m=139344343412337&w=2
来源:VUPEN
链接:http://www.vupen.com/english/advisories/2009/3316
来源:OVAL
链接:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6009
来源:SECUNIA
链接:http://secunia.com/advisories/32120
来源:REDHAT
链接:http://www.redhat.com/support/errata/RHSA-2008-0862.html
来源:FEDORA
链接:https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00712.html
来源:CONFIRM
链接:http://www.vmware.com/security/advisories/VMSA-2009-0016.html
来源:APPLE
链接:http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
来源:SECUNIA
链接:http://secunia.com/advisories/34013
来源:CONFIRM
链接:http://www.vmware.com/security/advisories/VMSA-2009-0002.html
来源:DEBIAN
链接:http://www.debian.org/security/2008/dsa-1593
来源:BID
链接:http://www.securityfocus.com/bid/29502
来源:SECUNIA
链接:http://secunia.com/advisories/31865
来源:MANDRIVA
链接:http://www.mandriva.com/security/advisories?name=MDVSA-2008:188
来源:HP
链接:http://marc.info/?l=bugtraq&m=123376588623823&w=2
来源:SECUNIA
链接:http://secunia.com/advisories/31891
来源:SECUNIA
链接:http://secunia.com/advisories/32222
来源:SECUNIA
链接:http://secunia.com/advisories/32266
来源:SECTRACK
链接:http://www.securitytracker.com/id?1020624
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
来源:SECUNIA
链接:http://secunia.com/advisories/33797
来源:CONFIRM
链接:http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm
来源:VUPEN
链接:http://www.vupen.com/english/advisories/2009/0503
来源:SECUNIA
链接:http://secunia.com/advisories/33999
来源:SECUNIA