CVE-2007-3383: XSS in Tomcat send mail example Severity: Low (Cross-site scripting)
Vendor: The Apache Software Foundation Versions Affected: 4.0.0 to 4.0.6 4.1.0 to 4.1.36 Description: When reporting error messages, the SendMailServlet does not filter user supplied data before display. This enables an XSS attack. Mitigation: Undeploy the examples web application. Credit: This issue was discovered by Tomasz Kuczynski, Poznan Supercomputing and Networking Center, who worked with the CERT/CC to report the vulnerability. Example: On this page http://localhost:8080/examples/jsp/mail/sendmail.jsp enter the following text <script>alert('XSS reflected')</script> in the From field and click Send. References: http://tomcat.apache.org/security.html Mark Thomas _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/