// For flags

CVE-2009-2696

tomcat: missing fix for CVE-2009-0781

Severity Score

6.1
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the calendar application in the examples web application in Apache Tomcat on Red Hat Enterprise Linux 5, Desktop Workstation 5, and Linux Desktop 5 allows remote attackers to inject arbitrary web script or HTML via the time parameter, related to "invalid HTML." NOTE: this is due to a missing fix for CVE-2009-0781.

Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en jsp/cal/cal2.jsp en la aplicación calendario en los ejemplos de aplicaciones web de Apache Tomcat en Red Hat Enterprise Linux v5, Desktop Workstation v5, y Linux Desktop v5 permite a atacantes remotos injectar código web o HTML a través de parámetros de tiempo, relacionados con "HTML no válido". NOTA: se debe a una corrección que falta para CVE-2009-0.781.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2009-08-05 CVE Reserved
  • 2010-08-05 CVE Published
  • 2024-08-07 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
<= 4.1.39
Search vendor "Apache" for product "Tomcat" and version " <= 4.1.39"
-
Affected
in Redhat
Search vendor "Redhat"
Desktop Workstation
Search vendor "Redhat" for product "Desktop Workstation"
5
Search vendor "Redhat" for product "Desktop Workstation" and version "5"
-
Safe
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
<= 4.1.39
Search vendor "Apache" for product "Tomcat" and version " <= 4.1.39"
-
Affected
in Redhat
Search vendor "Redhat"
Enterprise Linux
Search vendor "Redhat" for product "Enterprise Linux"
5
Search vendor "Redhat" for product "Enterprise Linux" and version "5"
-
Safe
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
<= 4.1.39
Search vendor "Apache" for product "Tomcat" and version " <= 4.1.39"
-
Affected
in Redhat
Search vendor "Redhat"
Enterprise Linux Desktop
Search vendor "Redhat" for product "Enterprise Linux Desktop"
5.0
Search vendor "Redhat" for product "Enterprise Linux Desktop" and version "5.0"
-
Safe