Bug 1713275 (CVE-2019-0221) - CVE-2019-0221 tomcat: XSS in SSI printenv
Summary: CVE-2019-0221 tomcat: XSS in SSI printenv
Status: NEW
Alias: CVE-2019-0221
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: impact=low,public=20190413,reported=2...
Keywords: Security
Depends On: 1713280 1724410 1724411 1713279
Blocks: 1713278
TreeView+ depends on / blocked
 
Reported: 2019-05-23 10:03 UTC by Dhananjay Arunesh
Modified: 2019-06-30 21:45 UTC (History)
59 users (show)

(edit)
Clone Of:
(edit)
Last Closed:


Attachments (Terms of Use)

Description Dhananjay Arunesh 2019-05-23 10:03:30 UTC
The SSI printenv command echoes user provided data without escaping and is, therefore, vulnerable to XSS. SSI is disabled by default. The printenv command is intended for debugging and is unlikely to be present in a production website.

Reference:
http://tomcat.apache.org/security-9.html

Upstream commit:
https://github.com/apache/tomcat/commit/15fcd16

Comment 1 Dhananjay Arunesh 2019-05-23 10:06:23 UTC
Created tomcat tracking bugs for this issue:

Affects: fedora-all [bug 1713279]

Comment 2 Dhananjay Arunesh 2019-05-23 10:06:53 UTC
Created tomcat tracking bugs for this issue:

Affects: epel-all [bug 1713280]

Comment 4 Joshua Padman 2019-06-12 02:55:37 UTC
This vulnerability is out of security support scope for the following product:
 * Red Hat JBoss Fuse 6

Please refer to https://access.redhat.com/support/policy/updates/jboss_notes for more details.

Comment 6 Doran Moppert 2019-06-27 03:20:19 UTC
Mitigation:

SSI is disabled in the default Tomcat configuration. The vulnerable printenv command is intended for debugging, and is recommended to not be enabled for a production website.


Note You need to log in before you can comment on or make changes to this bug.