漏洞信息详情

Apache Tomcat 'jsp/cal/cal2.jsp'跨站脚本攻击漏洞

  • CNNVD编号:CNNVD-200903-175
  • 危害等级: 中危
  • CVE编号: CVE-2009-0781
  • 漏洞类型: 跨站脚本
  • 发布时间: 2009-03-09
  • 威胁类型: 远程
  • 更新时间: 2019-04-02
  • 厂        商: Apache
  • 漏洞来源:

漏洞简介

Apache Tomcat是应用(java)服务器,它只是一个servlet(jsp也翻译成servlet)容器,可以认为是apache的扩展,但是可以独立于apache运行。

Apache Tomcat 4.1.0版本至4.1.39版本, 5.5.0版本至5.5.27版本,以及6.0.0版本至6.0.18版本的样板网络应用程序的日历应用程序中的jsp/cal/cal2.jsp存在跨站脚本攻击漏洞。远程攻击者可以借助与无效HTML相关的时间参数,注入任意web脚本或HTML。

漏洞公告

目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:

http://tomcat.apache.org/security-6.html

http://tomcat.apache.org/security-5.html

http://tomcat.apache.org/security-4.html

http://tomcat.apache.org/

参考网址

来源:APPLE

链接:http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html

来源:HP

链接:http://marc.info/?l=bugtraq&m=127420533226623&w=2

来源:OVAL

链接:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19345

来源:FEDORA

链接:https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01246.html

来源:SECUNIA

链接:http://secunia.com/advisories/42368

来源:OVAL

链接:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11041

来源:DEBIAN

链接:http://www.debian.org/security/2011/dsa-2207

来源:VUPEN

链接:http://www.vupen.com/english/advisories/2010/3056

来源:CONFIRM

链接:http://tomcat.apache.org/security-5.html

来源:BUGTRAQ

链接:http://www.securityfocus.com/archive/1/501538/100/0/threaded

来源:MLIST

链接:https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E

来源:CONFIRM

链接:http://www.vmware.com/security/advisories/VMSA-2009-0016.html

来源:SUSE

链接:http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html

来源:SECUNIA

链接:http://secunia.com/advisories/35685

来源:SUNALERT

链接:http://sunsolve.sun.com/search/document.do?assetkey=1-26-263529-1

来源:FEDORA

链接:https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01216.html

来源:SECUNIA

链接:http://secunia.com/advisories/35788

来源:HP

链接:http://marc.info/?l=bugtraq&m=136485229118404&w=2

来源:CONFIRM

链接:http://support.apple.com/kb/HT4077

来源:MLIST

链接:https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E

来源:CONFIRM

链接:http://tomcat.apache.org/security-6.html

来源:MANDRIVA

链接:http://www.mandriva.com/security/advisories?name=MDVSA-2009:136

来源:MLIST

链接:https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E

来源:MANDRIVA

链接:http://www.mandriva.com/security/advisories?name=MDVSA-2009:138

来源:HP

链接:http://marc.info/?l=bugtraq&m=129070310906557&w=2

来源:XF

链接:https://exchange.xforce.ibmcloud.com/vulnerabilities/49213

来源:FEDORA

链接:https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01156.html

来源:SECUNIA

链接:http://secunia.com/advisories/37460

来源:CONFIRM

链接:http://tomcat.apache.org/security-4.html

来源:MLIST

链接:https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E

来源:VUPEN

链接:http://www.vupen.com/english/advisories/2009/1856

来源:BUGTRAQ

链接:http://www.securityfocus.com/archive/1/507985/100/0/threaded

来源:HP

链接:http://marc.info/?l=bugtraq&m=133469267822771&w=2

来源:VUPEN

链接:http://www.vupen.com/english/advisories/2009/3316

来源:OVAL

链接:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6564

补丁

    暂无

漏洞信息快速查询

相关漏洞

更多