CVE-2008-1232 : Detail

CVE-2008-1232

Cross-site Scripting
A03-Injection
38.15%V4
Network
2008-08-03
23h00 +00:00
2020-02-13
15h08 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Cross-site scripting (XSS) vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via a crafted string that is used in the message argument to the HttpServletResponse.sendError method.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.

Metrics

Metrics Score Severity CVSS Vector Source
V2 4.3 AV:N/AC:M/Au:N/C:N/I:P/A:N nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 32138

Publication date : 2008-07-31 22h00 +00:00
Author : Konstantin Kolinko
EDB Verified : Yes

Products Mentioned

Configuraton 0

Apache>>Tomcat >> Version From (including) 4.1.0 To (including) 4.1.37

Apache>>Tomcat >> Version From (including) 5.5.0 To (including) 5.5.26

Apache>>Tomcat >> Version From (including) 6.0.0 To (including) 6.0.16

References

http://www.securitytracker.com/id?1020622
Tags : vdb-entry, x_refsource_SECTRACK
http://www.redhat.com/support/errata/RHSA-2008-0862.html
Tags : vendor-advisory, x_refsource_REDHAT
http://www.vupen.com/english/advisories/2009/1609
Tags : vdb-entry, x_refsource_VUPEN
http://www.vupen.com/english/advisories/2009/2194
Tags : vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/34013
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2823
Tags : vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/37460
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/31982
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/31681
Tags : vdb-entry, x_refsource_BID
http://secunia.com/advisories/32120
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/33999
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/30496
Tags : vdb-entry, x_refsource_BID
http://secunia.com/advisories/31865
Tags : third-party-advisory, x_refsource_SECUNIA
http://securityreason.com/securityalert/4098
Tags : third-party-advisory, x_refsource_SREASON
http://secunia.com/advisories/31639
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/36108
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDVSA-2008:188
Tags : vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/31379
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2009/0320
Tags : vdb-entry, x_refsource_VUPEN
http://www.redhat.com/support/errata/RHSA-2008-0864.html
Tags : vendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/57126
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/32222
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/31891
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/33797
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2305
Tags : vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/35474
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2780
Tags : vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/31381
Tags : third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=123376588623823&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=139344343412337&w=2
Tags : vendor-advisory, x_refsource_HP
http://support.apple.com/kb/HT3216
Tags : x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2009/0503
Tags : vdb-entry, x_refsource_VUPEN
http://www.vupen.com/english/advisories/2009/3316
Tags : vdb-entry, x_refsource_VUPEN
http://marc.info/?l=bugtraq&m=123376588623823&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/32266
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2008-0648.html
Tags : vendor-advisory, x_refsource_REDHAT