Bug 244804 (CVE-2007-2449)

Summary: CVE-2007-2449 tomcat examples jsp XSS
Product: [Other] Security Response Reporter: Mark J. Cox <mjc>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: viveklak
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: 5.5.25-1jpp.1.fc7 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2007-11-17 05:34:55 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 244810, 244811, 244812, 244813, 244814, 244816, 244817, 244818, 363081, 430730, 430731, 440521, 445320, 449337    
Bug Blocks: 444136    

Description Mark J. Cox 2007-06-19 09:56:26 UTC
According to http://tomcat.apache.org/security-5.html

low: Cross-site scripting   CVE-2007-2449

JSPs within the examples web application did not escape user provided data
before including it in the output. This enabled a XSS attack. These JSPs now
filter the data before use. This issue may be mitigated by undeploying the
examples web application. Note that it is recommended that the examples web
application is not installed on a production system.

Affects: 5.0.0-5.0.30, 5.5.0-5.5.24

example:
http://host:port/jsp-examples/snp/snoop.jsp;<script>alert()</script>test.jsp

Comment 7 Fedora Update System 2007-11-17 05:34:45 UTC
tomcat5-5.5.25-1jpp.1.fc7 has been pushed to the Fedora 7 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 8 Fedora Update System 2007-11-17 05:37:45 UTC
tomcat5-5.5.25-1jpp.1.fc8 has been pushed to the Fedora 8 stable repository.  If problems still persist, please make note of it in this bug report.