According to http://tomcat.apache.org/security-5.html
low: Cross-site scripting CVE-2007-2449
JSPs within the examples web application did not escape user provided data
before including it in the output. This enabled a XSS attack. These JSPs now
filter the data before use. This issue may be mitigated by undeploying the
examples web application. Note that it is recommended that the examples web
application is not installed on a production system.
Affects: 5.0.0-5.0.30, 5.5.0-5.5.24
example:
http://host:port/jsp-examples/snp/snoop.jsp;<script>alert()</script>test.jsp
Comment 7Fedora Update System
2007-11-17 05:34:45 UTC
tomcat5-5.5.25-1jpp.1.fc7 has been pushed to the Fedora 7 stable repository. If problems still persist, please make note of it in this bug report.
Comment 8Fedora Update System
2007-11-17 05:37:45 UTC
tomcat5-5.5.25-1jpp.1.fc8 has been pushed to the Fedora 8 stable repository. If problems still persist, please make note of it in this bug report.