Apache Tomcat 5.5.32 and 6.0.30 were released [1],[2] to fix, among other things, an XSS vulnerability in the HTML Manager [3]. The HTML Manager displayed unfiltered web application-provided data that could be used to trigger script execution by an administrative user when viewing the Manager pages, such as: <display-name><script>alert('hi');</script></display-name> For Tomcat 5.5.x, this was fixed in upstream revision 1057518 [4] and for Tomcat 6.x it was fixed in upstream revision 1057270 [5]. [1] http://tomcat.apache.org/security-5.html#Fixed_in_Apache_Tomcat_5.5.32 [2] http://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.30 [3] http://archives.neohapsis.com/archives/fulldisclosure/2011-02/0077.html [4] http://svn.apache.org/viewvc?rev=1057518&view=rev [5] http://svn.apache.org/viewvc?rev=1057270&view=rev
Created tomcat6 tracking bugs for this issue Affects: fedora-all [bug 675794]
Created tomcat5 tracking bugs for this issue Affects: fedora-all [bug 675795]
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2011:0791 https://rhn.redhat.com/errata/RHSA-2011-0791.html
This issue has been addressed in following products: JBoss Enterprise Web Server 1.0 Via RHSA-2011:0896 https://rhn.redhat.com/errata/RHSA-2011-0896.html
This issue has been addressed in following products: JBEWS 1.0 for RHEL 5 JBEWS 1.0 for RHEL 4 JBEWS 1 for RHEL 6 Via RHSA-2011:0897 https://rhn.redhat.com/errata/RHSA-2011-0897.html
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2011:1845 https://rhn.redhat.com/errata/RHSA-2011-1845.html
Statement: (none)