*** This bug is a security vulnerability ***

Public security bug reported:

CVE-2008-1232
The message argument of HttpServletResponse.sendError() call is not only 
displayed on the error page, but is also used for the reason-phrase of HTTP 
response. This may include characters that are illegal in HTTP headers. It is 
possible for a specially crafted message to result in arbitrary content being 
injected into the HTTP response. For a successful XSS attack, unfiltered user 
supplied data must be included in the message argument.

Affects: 6.0.0-6.0.16, 5.5.0-5.5.26

** Affects: tomcat5.5 (Ubuntu)
     Importance: Undecided
         Status: New

** Affects: tomcat6 (Ubuntu)
     Importance: Undecided
         Status: New

** Affects: tomcat5.5 (Debian)
     Importance: Unknown
         Status: Unknown

** Visibility changed to: Public

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2008-1232

** Also affects: tomcat5.5 (Ubuntu)
   Importance: Undecided
       Status: New

** Bug watch added: Debian Bug tracker #494504
   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494504

** Also affects: tomcat5.5 (Debian) via
   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494504
   Importance: Unknown
       Status: Unknown

-- 
Cross-site scripting through sendError (CVE-2008-1232)
https://bugs.launchpad.net/bugs/256926
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to