6.1
CVSSv3

CVE-2022-34305

Published: 23/06/2022 Updated: 26/10/2022
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.1 | Impact Score: 2.7 | Exploitability Score: 2.8
VMScore: 385
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

In Apache Tomcat 10.1.0-M1 to 10.1.0-M16, 10.0.0-M1 to 10.0.22, 9.0.30 to 9.0.64 and 8.5.50 to 8.5.81 the Form authentication example in the examples web application displayed user provided data without filtering, exposing a XSS vulnerability.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache tomcat 10.1.0

apache tomcat

Vendor Advisories

A flaw was found in the Apache Tomcat package An example web application did not filter the form authentication example, exposing a Cross-site scripting (XSS) vulnerability (CVE-2022-34305) ...
In Apache Tomcat 1010-M1 to 1010-M16, 1000-M1 to 10022, 9030 to 9064 and 8550 to 8581 the Form authentication example in the examples web application displayed user provided data without filtering, exposing a XSS vulnerability ...

Github Repositories

TODO better logging: Change logs to be async and send to a queue extract JWT_TOKEN to an external property better error handling for JWT Implement CRUD for user/login remove duplicate code from all *gradle files (repositories, plugins, ) Implement /api/v3/transactions/report /api/v3/transaction/list /api/v3/transaction Implement DAO layer UT, FT, IT Demo This demo ha

SMAP说明文档 后端模块接口文档 一、多主机总体扫描部分 1、ip地址接口 hostScanner In: 内容描述:ip网段 举例说明:(start_ip, end_ip) 形如 (19216811, 1921682128) 数据类型:str, str Out: 内容描述:该网段中存活的ip地址列表 举例说明:{"ip1":["hostname

CVE 2022-34305 Did you heard something about CVE-2022-34305? Are you trying to hunting this CVE on the wild? I've bad news: It's authenticated The ilustration above was grabbed from here Maybe you can have some luck trying to authenticating with the following default logins bellow: <user username="tomcat" password="tomcat" roles="tomc

CVE 2022-34305 Did you heard something about CVE-2022-34305? Are you trying to hunting this CVE on the wild? I've bad news: It's authenticated The ilustration above was grabbed from here Maybe you can have some luck trying to authenticating with the following default logins bellow: <user username="tomcat" password="tomcat" roles="tomc

SMAP说明文档 后端模块接口文档 一、多主机总体扫描部分 1、ip地址接口 hostScanner In: 内容描述:ip网段 举例说明:(start_ip, end_ip) 形如 (19216811, 1921682128) 数据类型:str, str Out: 内容描述:该网段中存活的ip地址列表 举例说明:{"ip1":["hostname