CVE-2010-4172
Published Nov 26, 2010
Last updated 2 years ago
Overview
- Description
- Multiple cross-site scripting (XSS) vulnerabilities in the Manager application in Apache Tomcat 6.0.12 through 6.0.29 and 7.0.0 through 7.0.4 allow remote attackers to inject arbitrary web script or HTML via the (1) orderBy or (2) sort parameter to sessionsList.jsp, or unspecified input to (3) sessionDetail.jsp or (4) java/org/apache/catalina/manager/JspHelper.java, related to use of untrusted web applications.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-79
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B6B0504-27C1-4824-A928-A878CBBAB32D" }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CE81AD36-ACD1-4C6C-8E7C-5326D1DA3045" }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D903956B-14F5-4177-AF12-0A5F1846D3C4" }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "81F847DC-A2F5-456C-9038-16A0E85F4C3B" }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AF3EBD00-1E1E-452D-AFFB-08A6BD111DDD" }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.17:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C6B93A3A-D487-4CA1-8257-26F8FE287B8B" }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.18:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BD8802B2-57E0-4AA6-BC8E-00DE60468569" }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.19:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8461DF95-18DC-4BF5-A703-7F19DA88DC30" }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F4C9BCF-9C73-4991-B02F-E08C5DA06EBA" }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.24:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2823789C-2CB6-4300-94DB-BDBE83ABA8E3" }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.26:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C5416C76-46ED-4CB1-A7F8-F24EA16DE7F9" }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.27:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A61429EE-4331-430C-9830-58DCCBCBCB58" }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.28:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "31B3593F-CEDF-423C-90F8-F88EED87DC3E" }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.29:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AE7862B2-E1FA-4E16-92CD-8918AB461D9A" }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0F8C62EF-1B67-456A-9C66-755439CF8556" }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "33E9607B-4D28-460D-896B-E4B7FA22441E" }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A819E245-D641-4F19-9139-6C940504F6E7" }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8C381275-10C5-4939-BCE3-0D1F3B3CB2EE" }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7205475A-6D04-4042-B24E-1DA5A57029B7" }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "08022987-B36B-4F63-88A5-A8F59195DF4A" } ], "operator": "OR" } ] } ]