// For flags

CVE-2008-1232

Apache Tomcat 6.0.16 - 'HttpServletResponse.sendError()' Cross-Site Scripting

Severity Score

4.3
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Cross-site scripting (XSS) vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via a crafted string that is used in the message argument to the HttpServletResponse.sendError method.

Vulnerabilidad de ejecución de secuencias de comandos en sitios cruzados (XSS) en Apache Tomcat 4.1.0 hasta la 4.1.37, 5.5.0 hasta la 5.5.26 y 6.0.0 hasta la 6.0.16, permite a atacantes remotos inyectar arbitrariamente secuencias de comandos web o HTML a través de una cadena manipulada usada en el argumento message del método HttpServletResponse.sendError.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2008-03-10 CVE Reserved
  • 2008-08-01 CVE Published
  • 2008-08-01 First Exploit
  • 2024-08-07 CVE Updated
  • 2024-08-10 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (67)
URL Tag Source
http://community.ca.com/blogs/casecurityresponseblog/archive/2009/06/15/ca20090615-02-ca-service-desk-tomcat-cross-site-scripting-vulnerability.aspx Broken Link
http://secunia.com/advisories/31379 Broken Link
http://secunia.com/advisories/31381 Broken Link
http://secunia.com/advisories/31639 Broken Link
http://secunia.com/advisories/31865 Broken Link
http://secunia.com/advisories/31891 Broken Link
http://secunia.com/advisories/31982 Broken Link
http://secunia.com/advisories/32120 Broken Link
http://secunia.com/advisories/32222 Broken Link
http://secunia.com/advisories/32266 Broken Link
http://secunia.com/advisories/33797 Broken Link
http://secunia.com/advisories/33999 Broken Link
http://secunia.com/advisories/34013 Broken Link
http://secunia.com/advisories/35474 Broken Link
http://secunia.com/advisories/36108 Broken Link
http://secunia.com/advisories/37460 Broken Link
http://secunia.com/advisories/57126 Broken Link
http://securityreason.com/securityalert/4098 Third Party Advisory
http://support.apple.com/kb/HT3216 Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm Third Party Advisory
http://www.securityfocus.com/archive/1/495021/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/504351/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/505556/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/507985/100/0/threaded Mailing List
http://www.securityfocus.com/bid/31681 Third Party Advisory
http://www.securitytracker.com/id?1020622 Third Party Advisory
http://www.vmware.com/security/advisories/VMSA-2009-0002.html Third Party Advisory
http://www.vmware.com/security/advisories/VMSA-2009-0016.html Third Party Advisory
http://www.vupen.com/english/advisories/2008/2305 Url Repurposed
http://www.vupen.com/english/advisories/2008/2780 Url Repurposed
http://www.vupen.com/english/advisories/2008/2823 Url Repurposed
http://www.vupen.com/english/advisories/2009/0320 Url Repurposed
http://www.vupen.com/english/advisories/2009/0503 Url Repurposed
http://www.vupen.com/english/advisories/2009/1609 Url Repurposed
http://www.vupen.com/english/advisories/2009/2194 Url Repurposed
http://www.vupen.com/english/advisories/2009/3316 Url Repurposed
https://exchange.xforce.ibmcloud.com/vulnerabilities/44155 Third Party Advisory
https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E Mailing List
https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E Mailing List
https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E Mailing List
https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E Mailing List
https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E Mailing List
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11181 Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5985 Signature
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=209500 Broken Link
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=214095 Broken Link
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
>= 4.1.0 <= 4.1.37
Search vendor "Apache" for product "Tomcat" and version " >= 4.1.0 <= 4.1.37"
-
Affected
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
>= 5.5.0 <= 5.5.26
Search vendor "Apache" for product "Tomcat" and version " >= 5.5.0 <= 5.5.26"
-
Affected
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
>= 6.0.0 <= 6.0.16
Search vendor "Apache" for product "Tomcat" and version " >= 6.0.0 <= 6.0.16"
-
Affected