OS X security update 2011-006 for Tomcat (CVE-2010-4172)
It was discovered that Tomcat did not properly escape certain parameters in the Manager application which could result in browsers becoming vulnerable to cross-site scripting attacks when processing the output. With cross-site scripting vulnerabilities, if a user were tricked into viewing server output during a crafted server request, a remote attacker could exploit this to modify the contents, or steal confidential data (such as passwords), within the same domain.
Multiple cross-site scripting (XSS) vulnerabilities in the Manager application in Apache Tomcat 6.0.12 through 6.0.29 and 7.0.0 through 7.0.4 allow remote attackers to inject arbitrary web script or HTML via the (1) orderBy or (2) sort parameter to sessionsList.jsp, or unspecified input to (3) sessionDetail.jsp or (4) java/org/apache/catalina/manager/JspHelper.java, related to use of untrusted web applications.
Apache Tomcat is a servlet container for the Java Servlet and JavaServerPages (JSP) technologies.It was found that web applications could modify the location of the Tomcathost's work directory. As web applications deployed on Tomcat have read andwrite access to this directory, a malicious web application could use thisflaw to trick Tomcat into giving it read and write access to an arbitrarydirectory on the file system. (CVE-2010-3718)A cross-site scripting (XSS) flaw was found in the Manager application,used for managing web applications on Tomcat. If a remote attacker couldtrick a user who is logged into the Manager application into visiting aspecially-crafted URL, the attacker could perform Manager application taskswith the privileges of the logged in user. (CVE-2010-4172)A second cross-site scripting (XSS) flaw was found in the Managerapplication. A malicious web application could use this flaw to conduct anXSS attack, leading to arbitrary web script execution with the privilegesof victims who are logged into and viewing Manager application web pages.(CVE-2011-0013)This update also fixes the following bugs:Users of Tomcat should upgrade to these updated packages, which containbackported patches to correct these issues. Tomcat must be restarted forthis update to take effect.