Vigil@nce: Apache Tomcat, Cross Site Scripting of Manager
December 2010 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/
SYNTHESIS OF THE VULNERABILITY
An attacker can send a malicious HTML document to the Apache
Tomcat administrator, in order to obtain his session cookie.
– Severity: 2/4
– Creation date: 23/11/2010
DESCRIPTION OF THE VULNERABILITY
The Manager application is used to administer an Apache Tomcat
server.
The sessionList.jsp and sessionDetail.jsp pages list sessions in
progress. They can be sorted via the "orderBy" and "sort"
parameters.
However, these parameters are not filtered before being displayed,
so an attacker can generate a Cross Site Scripting.
An attacker can therefore send a malicious HTML document to the
Apache Tomcat administrator, in order to obtain his session cookie.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Apache-Tomcat-Cross-Site-Scripting-of-Manager-10145