[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

247213

 
 

909

 
 

194329

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2008:188 -- Mandriva tomcat5

ID: oval:org.secpod.oval:def:301557Date: (C)2012-01-07   (M)2023-11-09
Class: PATCHFamily: unix




A number of vulnerabilities have been discovered in the Apache Tomcat server: The default catalina.policy in the JULI logging component did not restrict certain permissions for web applications which could allow a remote attacker to modify logging configuration options and overwrite arbitrary files . A cross-site scripting vulnerability was found in the HttpServletResponse.sendError method which could allow a remote attacker to inject arbitrary web script or HTML via forged HTTP headers . A cross-site scripting vulnerability was found in the host manager application that could allow a remote attacker to inject arbitrary web script or HTML via the hostname parameter . A traversal vulnerability was found when using a RequestDispatcher in combination with a servlet or JSP that could allow a remote attacker to utilize a specially-crafted request parameter to access protected web resources . A traversal vulnerability was found when the "allowLinking" and "URIencoding" settings were actived which could allow a remote attacker to use a UTF-8-encoded request to extend their privileges and obtain local files accessible to the Tomcat process . The updated packages have been patched to correct these issues.

Platform:
Mandriva Linux 2008.1
Mandriva Linux 2008.0
Product:
tomcat5
Reference:
MDVSA-2008:188
CVE-2007-5342
CVE-2008-1232
CVE-2008-1947
CVE-2008-2370
CVE-2008-2938
CVE    5
CVE-2007-5342
CVE-2008-1232
CVE-2008-1947
CVE-2008-2370
...
CPE    2
cpe:/o:mandriva:linux:2008.1
cpe:/o:mandriva:linux:2008.0

© SecPod Technologies