CVE-2008-1232
Summary
| CVE | CVE-2008-1232 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2008-08-04 01:41:00 UTC |
| Updated | 2023-02-13 02:18:00 UTC |
| Description | Cross-site scripting (XSS) vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via a crafted string that is used in the message argument to the HttpServletResponse.sendError method. |
Risk And Classification
Problem Types: CWE-79
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Apache | Tomcat | 4.1.0 | All | All | All |
| Application | Apache | Tomcat | 4.1.1 | All | All | All |
| Application | Apache | Tomcat | 4.1.10 | All | All | All |
| Application | Apache | Tomcat | 4.1.12 | All | All | All |
| Application | Apache | Tomcat | 4.1.15 | All | All | All |
| Application | Apache | Tomcat | 4.1.2 | All | All | All |
| Application | Apache | Tomcat | 4.1.24 | All | All | All |
| Application | Apache | Tomcat | 4.1.28 | All | All | All |
| Application | Apache | Tomcat | 4.1.3 | All | All | All |
| Application | Apache | Tomcat | 4.1.31 | All | All | All |
| Application | Apache | Tomcat | 4.1.36 | All | All | All |
| Application | Apache | Tomcat | 5.5.0 | All | All | All |
| Application | Apache | Tomcat | 5.5.1 | All | All | All |
| Application | Apache | Tomcat | 5.5.10 | All | All | All |
| Application | Apache | Tomcat | 5.5.11 | All | All | All |
| Application | Apache | Tomcat | 5.5.12 | All | All | All |
| Application | Apache | Tomcat | 5.5.13 | All | All | All |
| Application | Apache | Tomcat | 5.5.14 | All | All | All |
| Application | Apache | Tomcat | 5.5.15 | All | All | All |
| Application | Apache | Tomcat | 5.5.16 | All | All | All |
| Application | Apache | Tomcat | 5.5.17 | All | All | All |
| Application | Apache | Tomcat | 5.5.18 | All | All | All |
| Application | Apache | Tomcat | 5.5.19 | All | All | All |
| Application | Apache | Tomcat | 5.5.2 | All | All | All |
| Application | Apache | Tomcat | 5.5.20 | All | All | All |
| Application | Apache | Tomcat | 5.5.21 | All | All | All |
| Application | Apache | Tomcat | 5.5.22 | All | All | All |
| Application | Apache | Tomcat | 5.5.23 | All | All | All |
| Application | Apache | Tomcat | 5.5.24 | All | All | All |
| Application | Apache | Tomcat | 5.5.25 | All | All | All |
| Application | Apache | Tomcat | 6.0 | All | All | All |
| Application | Apache | Tomcat | 6.0.0 | All | All | All |
| Application | Apache | Tomcat | 6.0.1 | All | All | All |
| Application | Apache | Tomcat | 6.0.10 | All | All | All |
| Application | Apache | Tomcat | 6.0.11 | All | All | All |
| Application | Apache | Tomcat | 6.0.12 | All | All | All |
| Application | Apache | Tomcat | 6.0.13 | All | All | All |
| Application | Apache | Tomcat | 6.0.14 | All | All | All |
| Application | Apache | Tomcat | 6.0.15 | All | All | All |
| Application | Apache | Tomcat | 4.1.0 | All | All | All |
| Application | Apache | Tomcat | 4.1.1 | All | All | All |
| Application | Apache | Tomcat | 4.1.10 | All | All | All |
| Application | Apache | Tomcat | 4.1.12 | All | All | All |
| Application | Apache | Tomcat | 4.1.15 | All | All | All |
| Application | Apache | Tomcat | 4.1.2 | All | All | All |
| Application | Apache | Tomcat | 4.1.24 | All | All | All |
| Application | Apache | Tomcat | 4.1.28 | All | All | All |
| Application | Apache | Tomcat | 4.1.3 | All | All | All |
| Application | Apache | Tomcat | 4.1.31 | All | All | All |
| Application | Apache | Tomcat | 4.1.36 | All | All | All |
| Application | Apache | Tomcat | 5.5.0 | All | All | All |
| Application | Apache | Tomcat | 5.5.1 | All | All | All |
| Application | Apache | Tomcat | 5.5.10 | All | All | All |
| Application | Apache | Tomcat | 5.5.11 | All | All | All |
| Application | Apache | Tomcat | 5.5.12 | All | All | All |
| Application | Apache | Tomcat | 5.5.13 | All | All | All |
| Application | Apache | Tomcat | 5.5.14 | All | All | All |
| Application | Apache | Tomcat | 5.5.15 | All | All | All |
| Application | Apache | Tomcat | 5.5.16 | All | All | All |
| Application | Apache | Tomcat | 5.5.17 | All | All | All |
| Application | Apache | Tomcat | 5.5.18 | All | All | All |
| Application | Apache | Tomcat | 5.5.19 | All | All | All |
| Application | Apache | Tomcat | 5.5.2 | All | All | All |
| Application | Apache | Tomcat | 5.5.20 | All | All | All |
| Application | Apache | Tomcat | 5.5.21 | All | All | All |
| Application | Apache | Tomcat | 5.5.22 | All | All | All |
| Application | Apache | Tomcat | 5.5.23 | All | All | All |
| Application | Apache | Tomcat | 5.5.24 | All | All | All |
| Application | Apache | Tomcat | 5.5.25 | All | All | All |
| Application | Apache | Tomcat | 6.0 | All | All | All |
| Application | Apache | Tomcat | 6.0.0 | All | All | All |
| Application | Apache | Tomcat | 6.0.1 | All | All | All |
| Application | Apache | Tomcat | 6.0.10 | All | All | All |
| Application | Apache | Tomcat | 6.0.11 | All | All | All |
| Application | Apache | Tomcat | 6.0.12 | All | All | All |
| Application | Apache | Tomcat | 6.0.13 | All | All | All |
| Application | Apache | Tomcat | 6.0.14 | All | All | All |
| Application | Apache | Tomcat | 6.0.15 | All | All | All |
| Application | Apache | Tomcat | All | All | All | All |
| Application | Apache | Tomcat | All | All | All | All |
| Application | Apache | Tomcat | All | All | All | All |
| Application | Apache Software Foundation | Tomcat | 4.1 | All | All | All |
| Application | Apache Software Foundation | Tomcat | 4.1.32 | All | All | All |
| Application | Apache Software Foundation | Tomcat | 4.1.34 | All | All | All |
| Application | Apache Software Foundation | Tomcat | 4.1.37 | All | All | All |
| Application | Apache Software Foundation | Tomcat | 5.5.26 | All | All | All |
| Application | Apache Software Foundation | Tomcat | 6.0.16 | All | All | All |
| Application | Apache Software Foundation | Tomcat | 4.1 | All | All | All |
| Application | Apache Software Foundation | Tomcat | 4.1.32 | All | All | All |
| Application | Apache Software Foundation | Tomcat | 4.1.34 | All | All | All |
| Application | Apache Software Foundation | Tomcat | 4.1.37 | All | All | All |
| Application | Apache Software Foundation | Tomcat | 5.5.26 | All | All | All |
| Application | Apache Software Foundation | Tomcat | 6.0.16 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | |
| Apache Tomcat Multiple Vulnerabilities - Secunia Advisories - Vulnerability Intelligence - Secunia.com | SECUNIA | secunia.com | |
| Pony Mail! | MISC | lists.apache.org | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | |
| Pony Mail! | MISC | lists.apache.org | |
| Security Advisories | Mandriva Linux | MANDRIVA | www.mandriva.com | |
| Apache Tomcat 'HttpServletResponse.sendError()' Cross Site Scripting Vulnerability | BID | www.securityfocus.com | Exploit, Patch |
| VMware Products Update for Multiple Packages - Secunia Advisories - Vulnerability Information - Secunia.com | SECUNIA | secunia.com | |
| About Secunia Research | Flexera | SECUNIA | secunia.com | |
| Pony Mail! | MLIST | lists.apache.org | |
| CA20090615-02: CA Service Desk Tomcat Cross Site Scripting Vulnerability - CA Security Response Blog | CONFIRM | community.ca.com | |
| [security-announce] SUSE Security Summary Report: SUSE-SR:2008:018 | SUSE | lists.opensuse.org | |
| Red Hat Customer Portal - Access to 24x7 support and knowledge | MISC | access.redhat.com | |
| CVE-2008-1232 - Red Hat Customer Portal | MISC | access.redhat.com | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | |
| Red Hat Customer Portal | MISC | access.redhat.com | |
| ASA-2008-401 (RHSA-2008-0862) | CONFIRM | support.avaya.com | |
| Red Hat update for tomcat - Secunia Advisories - Vulnerability Intelligence - Secunia.com | SECUNIA | secunia.com | |
| IBM X-Force Exchange | XF | exchange.xforce.ibmcloud.com | |
| access.redhat.com | REDHAT | www.redhat.com | |
| SUSE Update for Multiple Packages - Secunia Advisories - Vulnerability Intelligence - Secunia.com | SECUNIA | secunia.com | |
| HP-UX update for Apache - Secunia Advisories - Vulnerability Intelligence - Secunia.com | SECUNIA | secunia.com | |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | |
| [SECURITY] Fedora 8 Update: tomcat5-5.5.27-0jpp.2.fc8 | FEDORA | www.redhat.com | |
| Pony Mail! | MISC | lists.apache.org | |
| VMSA-2009-0002 - VMware | CONFIRM | www.vmware.com | |
| Apple Mac OS X Security Update Fixes Multiple Vulnerabilities - Secunia Advisories - Vulnerability Intelligence - Secunia.com | SECUNIA | secunia.com | |
| RETIRED: Apple Mac OS X 2008-007 Multiple Security Vulnerabilities | BID | www.securityfocus.com | |
| Pony Mail! | MLIST | lists.apache.org | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | |
| Red Hat Customer Portal | MISC | access.redhat.com | |
| Red Hat Customer Portal | MISC | access.redhat.com | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | |
| access.redhat.com | REDHAT | www.redhat.com | |
| About Security Update 2008-007 | CONFIRM | support.apple.com | |
| Fedora update for tomcat6 - Secunia Advisories - Vulnerability Intelligence - Secunia.com | SECUNIA | secunia.com | |
| Pony Mail! | MLIST | lists.apache.org | |
| CA Service Desk Tomcat Cross-Site Scripting Vulnerability - Secunia Advisories - Vulnerability Information - Secunia.com | SECUNIA | secunia.com | |
| VMware Multiple Products Tomcat Vulnerabilities - Secunia Advisories - Vulnerability Information - Secunia.com | SECUNIA | secunia.com | |
| Pony Mail! | MISC | lists.apache.org | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | |
| Pony Mail! | MLIST | lists.apache.org | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | |
| Pony Mail! | MISC | lists.apache.org | |
| Apache Tomcat® - Apache Tomcat 4.x vulnerabilities | CONFIRM | tomcat.apache.org | |
| access.redhat.com | REDHAT | www.redhat.com | |
| SecurityReason - Apache Tomcat XSS vulnerability | SREASON | securityreason.com | |
| Red Hat Customer Portal | MISC | access.redhat.com | |
| 404 Not Found | CONFIRM | support.ca.com | |
| Apache Tomcat - Apache Tomcat 5 vulnerabilities | CONFIRM | tomcat.apache.org | |
| APPLE-SA-2008-10-09 Security Update 2008-007 | APPLE | lists.apple.com | |
| 457597 – (CVE-2008-1232) CVE-2008-1232 tomcat: Cross-Site-Scripting enabled by sendError call | MISC | bugzilla.redhat.com | |
| [security-announce] SUSE Security Summary Report: SUSE-SR:2009:004 | SUSE | lists.opensuse.org | |
| Pony Mail! | MISC | lists.apache.org | |
| [SECURITY] Fedora 9 Update: tomcat6-6.0.18-1.1.fc9 | FEDORA | www.redhat.com | |
| Pony Mail! | MLIST | lists.apache.org | |
| Avaya AES / MX Apache Tomcat Multiple Vulnerabilities - Secunia Advisories - Vulnerability Intelligence - Secunia.com | SECUNIA | secunia.com | |
| [SECURITY] Fedora 9 Update: tomcat5-5.5.27-0jpp.2.fc9 | FEDORA | www.redhat.com | |
| Repository / Oval Repository | OVAL | oval.cisecurity.org | |
| CA Unicenter Products Tomcat Cross-Site Scripting Vulnerabilities - Secunia.com | SECUNIA | secunia.com | |
| Pony Mail! | MISC | lists.apache.org | |
| Pony Mail! | MLIST | lists.apache.org | |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | |
| VMware VirtualCenter update for Tomcat - Secunia Advisories - Vulnerability Information - Secunia.com | SECUNIA | secunia.com | |
| Fedora update for tomcat5 - Secunia Advisories - Vulnerability Intelligence - Secunia.com | SECUNIA | secunia.com | |
| VMSA-2009-0016.1 | CONFIRM | www.vmware.com | |
| Tomcat Input Validation Hole in HttpServletResponse.sendError() Permits Cross-Site Scripting Attacks - SecurityTracker | SECTRACK | www.securitytracker.com | |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | |
| 404 Not Found | CONFIRM | support.ca.com | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | |
| HPSBUX02401 | HP | marc.info | |
| Apache Tomcat 6 Multiple Vulnerabilities - Secunia Advisories - Vulnerability Intelligence - Secunia.com | SECUNIA | secunia.com | |
| '[security bulletin] HPSBST02955 rev.1 - HP XP P9000 Performance Advisor Software, 3rd party Software' - MARC | HP | marc.info | |
| Red Hat update for tomcat - Secunia Advisories - Vulnerability Intelligence - Secunia.com | SECUNIA | secunia.com | |
| Repository / Oval Repository | OVAL | oval.cisecurity.org | |
| Red Hat Customer Portal | MISC | access.redhat.com | |
| Apache Tomcat® - Apache Tomcat 6 vulnerabilities | CONFIRM | tomcat.apache.org | |
| Pony Mail! | MLIST | lists.apache.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 995459 Java (Maven) Security Update for org.apache.tomcat:tomcat (GHSA-q74x-qqhr-f8rx)