TUCoPS :: Web :: Apache :: web5531.htm

Apache tomcat XSS
11th Jul 2002 [SBWID-5531]
COMMAND

	Apache tomcat XSS

SYSTEMS AFFECTED

	Apache Tomcat v4.0.3

PROBLEM

	In  Matt   Moore   [matt@westpoint.ltd.uk]   advisory   [ID#:wp-02-0008]
	[http://www.westpoint.ltd.uk] :
	

	By using the /servlet/ mapping to invoke various servlets /  classes  it
	is possible  to  cause  Tomcat  to  throw  an  exception,  allowing  XSS
	attacks:
	

	tomcat-server/servlet/org.apache.catalina.servlets.WebdavStatus/SCRIPTalert(document.domain)/SCRIPT 

	tomcat-server/servlet/org.apache.catalina.ContainerServlet/SCRIPTalert(document.domain)/SCRIPT 

	tomcat-server/servlet/org.apache.catalina.Context/SCRIPTalert(document.domain)/SCRIPT 

	tomcat-server/servlet/org.apache.catalina.Globals/SCRIPTalert(document.domain)/SCRIPT 

	

	Linux and Win32 versions of Tomcat are vulnerable.
	

	The DOS device name physical path disclosure bug  reported  recently  by
	Peter Grundl can also be used to perform XSS attacks, e.g:
	

	tomcat-server/COM2.IMG%20src= \"Javascript:alert(document.domain)\"

	

	This is obviously Win32 specific.

SOLUTION

	Upgrading to v4.1.3 beta resolves the DOS device name XSS issue.
	

	The workaround for the other XSS issues described above is as follows:
	

	The \"invoker\" servlet (mapped to /servlet/), which executes  anonymous
	servlet classes that have not been defined in a web.xml file  should  be
	unmapped.
	

	The entry for this can be found in the  /tomcat-install-dir/conf/web.xml
	file.
	

	Two  Nessus  plugins   should   be   available   to   test   for   these
	vulnerabilities from www.nessus.org:
	

	apache_tomcat_DOS_Device_XSS.nasl

	apache_tomcat_Servlet_XSS.nasl

	

	This advisory is available online at:
	

	http://www.westpoint.ltd.uk/advisories/wp-02-0008.txt

	

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH