Published: 26/11/2010 Updated: 13/02/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 435
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Multiple cross-site scripting (XSS) vulnerabilities in the Manager application in Apache Tomcat 6.0.12 up to and including 6.0.29 and 7.0.0 up to and including 7.0.4 allow remote malicious users to inject arbitrary web script or HTML via the (1) orderBy or (2) sort parameter to sessionsList.jsp, or unspecified input to (3) sessionDetail.jsp or (4) java/org/apache/catalina/manager/JspHelper.java, related to use of untrusted web applications.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.
Vulnerable Product Search on Vulmon Subscribe to Product

apache tomcat 7.0.1

apache tomcat 7.0.2

apache tomcat 6.0.15

apache tomcat 7.0.0

apache tomcat 6.0.20

apache tomcat 6.0.29

apache tomcat 6.0.24

apache tomcat 6.0.17

apache tomcat 6.0.28

apache tomcat 6.0.14

apache tomcat 6.0.12

apache tomcat 6.0.18

apache tomcat 6.0.13

apache tomcat 7.0.4

apache tomcat 7.0.3

apache tomcat 6.0.26

apache tomcat 6.0.19

apache tomcat 6.0.27

apache tomcat 6.0.16

Vendor Advisories

It was discovered that Tomcat did not properly escape certain parameters in the Manager application which could result in browsers becoming vulnerable to cross-site scripting attacks when processing the output With cross-site scripting vulnerabilities, if a user were tricked into viewing server output during a crafted server request, a remote atta ...
Debian Bug report logs - #606388 CVE-2010-4172: XSS issues Package: tomcat6; Maintainer for tomcat6 is Debian Java Maintainers <pkg-java-maintainers@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Wed, 8 Dec 2010 20:48:02 UTC Severity: grave Tags: security Fixed in version tomcat6/6 ...
Debian Bug report logs - #608286 CVE-2010-4312: does not use HTTPOnly for session cookies by default Package: tomcat6; Maintainer for tomcat6 is Debian Java Maintainers <pkg-java-maintainers@listsaliothdebianorg>; Reported by: Giuseppe Iuculano <iuculano@debianorg> Date: Wed, 29 Dec 2010 17:33:02 UTC Severity: mi ...
IntelligenceCenter uses a version of Tomcat that has several publicly documented vulnerabilities The most severe vulnerability allows an attacker to mount a denial of service attack or to obtain sensitive information by using a specially crafted header ...


source: wwwsecurityfocuscom/bid/45015/info Apache Tomcat is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site This may let the a ...