Author: markt
Date: Wed Jun 13 19:20:24 2007
New Revision: 547089

URL: http://svn.apache.org/viewvc?view=rev&rev=547089
Log:
Add CVE-2007-2449 and CVE-2007-2450.

Modified:
    tomcat/site/trunk/docs/security-4.html
    tomcat/site/trunk/docs/security-5.html
    tomcat/site/trunk/docs/security-6.html
    tomcat/site/trunk/xdocs/security-4.xml
    tomcat/site/trunk/xdocs/security-5.xml
    tomcat/site/trunk/xdocs/security-6.xml

Modified: tomcat/site/trunk/docs/security-4.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-4.html?view=diff&rev=547089&r1=547088&r2=547089
==============================================================================
--- tomcat/site/trunk/docs/security-4.html (original)
+++ tomcat/site/trunk/docs/security-4.html Wed Jun 13 19:20:24 2007
@@ -261,6 +261,20 @@
 <p>
 <blockquote>
     <p>
+<strong>important: Information disclosure</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3164";>
+       CVE-2005-3164</a>
+</p>
+
+    <p>If a client specifies a Content-Length but disconnects before sending
+       any of the request body, the deprecated AJP connector processes the
+       request using the request body of the previous request. Users are 
advised
+       to use the default, supported Coyote AJP connector which does not 
exhibit
+       this issue.</p>
+
+    <p>Affects: 4.0.1-4.0.6, 4.1.0-4.1.36</p>
+
+    <p>
 <strong>moderate: Cross-site scripting</strong>
        <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1355";>
        CVE-2007-1355</a>
@@ -272,43 +286,37 @@
        simplified not to use any user provided data in the output.</p>
 
     <p>Affects: 4.0.1-4.0.6, 4.1.0-4.1.36</p>
-  </blockquote>
+
+    <p>
+<strong>low: Cross-site scripting</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2449";>
+       CVE-2007-2449</a>
 </p>
-</td>
-</tr>
-<tr>
-<td>
-<br/>
-</td>
-</tr>
-</table>
-<table border="0" cellspacing="0" cellpadding="2" width="100%">
-<tr>
-<td bgcolor="#525D76">
-<font color="#ffffff" face="arial,helvetica,sanserif">
-<a name="Fixed in Apache Tomcat 4.1.HEAD">
-<strong>Fixed in Apache Tomcat 4.1.HEAD</strong>
-</a>
-</font>
-</td>
-</tr>
-<tr>
-<td>
-<p>
-<blockquote>
+
+    <p>JSPs within the examples web application did not escape user provided
+       data before including it in the output. This enabled a XSS attack. These
+       JSPs now filter the data before use. This issue may be mitigated by
+       undeploying the examples web application. Note that it is recommended
+       that the examples web application is not installed on a production
+       system.
+       </p>
+
+    <p>Affects: 4.0.0-4.0.6, 4.1.0-4.1.36</p>
+
     <p>
-<strong>important: Information disclosure</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3164";>
-       CVE-2005-3164</a>
+<strong>low: Cross-site scripting</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2450";>
+       CVE-2007-2450</a>
 </p>
 
-    <p>If a client specifies a Content-Length but disconnects before sending
-       any of the request body, the deprecated AJP connector processes the
-       request using the request body of the previous request. Users are 
advised
-       to use the default, supported Coyote AJP connector which does not 
exhibit
-       this issue.</p>
+    <p>The Manager web application did not escape user provided data before
+       including it in the output. This enabled a XSS attack. This applciation
+       now filters the data before use. This issue may be mitigated by logging
+       out (closing the browser) of the application once the management tasks
+       have been completed.</p>
 
     <p>Affects: 4.0.1-4.0.6, 4.1.0-4.1.36</p>
+
   </blockquote>
 </p>
 </td>

Modified: tomcat/site/trunk/docs/security-5.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-5.html?view=diff&rev=547089&r1=547088&r2=547089
==============================================================================
--- tomcat/site/trunk/docs/security-5.html (original)
+++ tomcat/site/trunk/docs/security-5.html Wed Jun 13 19:20:24 2007
@@ -222,6 +222,60 @@
 <p>
 <blockquote>
     <p>
+<strong>low: Cross-site scripting</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2449";>
+       CVE-2007-2449</a>
+</p>
+
+    <p>JSPs within the examples web application did not escape user provided
+       data before including it in the output. This enabled a XSS attack. These
+       JSPs now filter the data before use. This issue may be mitigated by
+       undeploying the examples web application. Note that it is recommended
+       that the examples web application is not installed on a production
+       system.
+       </p>
+
+    <p>Affects: 5.0.0-5.0.30, 5.5.0-5.5.24</p>
+
+    <p>
+<strong>low: Cross-site scripting</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2450";>
+       CVE-2007-2450</a>
+</p>
+
+    <p>The Manager and Host Manager web applications did not escape user
+       provided data before including it in the output. This enabled a XSS
+       attack. These applciations now filter the data before use. This issue 
may
+       be mitigated by logging out (closing the browser) of the application 
once
+       the management tasks have been completed.</p>
+
+    <p>Affects: 5.0.0-5.0.30, 5.5.0-5.5.24</p>
+
+  </blockquote>
+</p>
+</td>
+</tr>
+<tr>
+<td>
+<br/>
+</td>
+</tr>
+</table>
+<table border="0" cellspacing="0" cellpadding="2" width="100%">
+<tr>
+<td bgcolor="#525D76">
+<font color="#ffffff" face="arial,helvetica,sanserif">
+<a name="Fixed in Apache Tomcat 5.5.24, 5.0.HEAD">
+<strong>Fixed in Apache Tomcat 5.5.24, 5.0.HEAD</strong>
+</a>
+</font>
+</td>
+</tr>
+<tr>
+<td>
+<p>
+<blockquote>
+    <p>
 <strong>moderate: Cross-site scripting</strong>
        <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1355";>
        CVE-2007-1355</a>
@@ -233,6 +287,7 @@
        simplified not to use any user provided data in the output.</p>
 
     <p>Affects: 5.0.0-5.0.30, 5.5.0-5.5.23</p>
+
   </blockquote>
 </p>
 </td>

Modified: tomcat/site/trunk/docs/security-6.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-6.html?view=diff&rev=547089&r1=547088&r2=547089
==============================================================================
--- tomcat/site/trunk/docs/security-6.html (original)
+++ tomcat/site/trunk/docs/security-6.html Wed Jun 13 19:20:24 2007
@@ -211,6 +211,59 @@
 <tr>
 <td bgcolor="#525D76">
 <font color="#ffffff" face="arial,helvetica,sanserif">
+<a name="Fixed in Apache Tomcat 6.0.HEAD">
+<strong>Fixed in Apache Tomcat 6.0.HEAD</strong>
+</a>
+</font>
+</td>
+</tr>
+<tr>
+<td>
+<p>
+<blockquote>
+    <p>
+<strong>low: Cross-site scripting</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2449";>
+       CVE-2007-2449</a>
+</p>
+
+    <p>JSPs within the examples web application did not escape user provided
+       data before including it in the output. This enabled a XSS attack. These
+       JSPs now filter the data before use. This issue may be mitigated by
+       undeploying the examples web application. Note that it is recommended
+       that the examples web application is not installed on a production
+       system.
+       </p>
+
+    <p>Affects: 6.0.0-6.0.13</p>
+
+    <p>
+<strong>low: Cross-site scripting</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2450";>
+       CVE-2007-2450</a>
+</p>
+
+    <p>The Manager and Host Manager web applications did not escape user
+       provided data before including it in the output. This enabled a XSS
+       attack. These applciations now filter the data before use. This issue 
may
+       be mitigated by logging out (closing the browser) of the application 
once
+       the management tasks have been completed.</p>
+
+    <p>Affects: 6.0.0-6.0.13</p>
+  </blockquote>
+</p>
+</td>
+</tr>
+<tr>
+<td>
+<br/>
+</td>
+</tr>
+</table>
+<table border="0" cellspacing="0" cellpadding="2" width="100%">
+<tr>
+<td bgcolor="#525D76">
+<font color="#ffffff" face="arial,helvetica,sanserif">
 <a name="Fixed in Apache Tomcat 6.0.11">
 <strong>Fixed in Apache Tomcat 6.0.11</strong>
 </a>

Modified: tomcat/site/trunk/xdocs/security-4.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-4.xml?view=diff&rev=547089&r1=547088&r2=547089
==============================================================================
--- tomcat/site/trunk/xdocs/security-4.xml (original)
+++ tomcat/site/trunk/xdocs/security-4.xml Wed Jun 13 19:20:24 2007
@@ -41,6 +41,18 @@
   </section>
 
   <section name="Fixed in Apache Tomcat 4.1.HEAD">
+    <p><strong>important: Information disclosure</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3164";>
+       CVE-2005-3164</a></p>
+
+    <p>If a client specifies a Content-Length but disconnects before sending
+       any of the request body, the deprecated AJP connector processes the
+       request using the request body of the previous request. Users are 
advised
+       to use the default, supported Coyote AJP connector which does not 
exhibit
+       this issue.</p>
+
+    <p>Affects: 4.0.1-4.0.6, 4.1.0-4.1.36</p>
+
     <p><strong>moderate: Cross-site scripting</strong>
        <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1355";>
        CVE-2007-1355</a></p>
@@ -51,20 +63,33 @@
        simplified not to use any user provided data in the output.</p>
 
     <p>Affects: 4.0.1-4.0.6, 4.1.0-4.1.36</p>
-  </section>
 
-  <section name="Fixed in Apache Tomcat 4.1.HEAD">
-    <p><strong>important: Information disclosure</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3164";>
-       CVE-2005-3164</a></p>
+    <p><strong>low: Cross-site scripting</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2449";>
+       CVE-2007-2449</a></p>
 
-    <p>If a client specifies a Content-Length but disconnects before sending
-       any of the request body, the deprecated AJP connector processes the
-       request using the request body of the previous request. Users are 
advised
-       to use the default, supported Coyote AJP connector which does not 
exhibit
-       this issue.</p>
+    <p>JSPs within the examples web application did not escape user provided
+       data before including it in the output. This enabled a XSS attack. These
+       JSPs now filter the data before use. This issue may be mitigated by
+       undeploying the examples web application. Note that it is recommended
+       that the examples web application is not installed on a production
+       system.
+       </p>
+
+    <p>Affects: 4.0.0-4.0.6, 4.1.0-4.1.36</p>
+
+    <p><strong>low: Cross-site scripting</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2450";>
+       CVE-2007-2450</a></p>
+
+    <p>The Manager web application did not escape user provided data before
+       including it in the output. This enabled a XSS attack. This applciation
+       now filters the data before use. This issue may be mitigated by logging
+       out (closing the browser) of the application once the management tasks
+       have been completed.</p>
 
     <p>Affects: 4.0.1-4.0.6, 4.1.0-4.1.36</p>
+
   </section>
 
   <section name="Fixed in Apache Tomcat 4.1.36">

Modified: tomcat/site/trunk/xdocs/security-5.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-5.xml?view=diff&rev=547089&r1=547088&r2=547089
==============================================================================
--- tomcat/site/trunk/xdocs/security-5.xml (original)
+++ tomcat/site/trunk/xdocs/security-5.xml Wed Jun 13 19:20:24 2007
@@ -25,6 +25,35 @@
   </section>
 
   <section name="Fixed in Apache Tomcat 5.5.HEAD, 5.0.HEAD">
+    <p><strong>low: Cross-site scripting</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2449";>
+       CVE-2007-2449</a></p>
+
+    <p>JSPs within the examples web application did not escape user provided
+       data before including it in the output. This enabled a XSS attack. These
+       JSPs now filter the data before use. This issue may be mitigated by
+       undeploying the examples web application. Note that it is recommended
+       that the examples web application is not installed on a production
+       system.
+       </p>
+
+    <p>Affects: 5.0.0-5.0.30, 5.5.0-5.5.24</p>
+
+    <p><strong>low: Cross-site scripting</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2450";>
+       CVE-2007-2450</a></p>
+
+    <p>The Manager and Host Manager web applications did not escape user
+       provided data before including it in the output. This enabled a XSS
+       attack. These applciations now filter the data before use. This issue 
may
+       be mitigated by logging out (closing the browser) of the application 
once
+       the management tasks have been completed.</p>
+
+    <p>Affects: 5.0.0-5.0.30, 5.5.0-5.5.24</p>
+
+  </section>
+
+  <section name="Fixed in Apache Tomcat 5.5.24, 5.0.HEAD">
     <p><strong>moderate: Cross-site scripting</strong>
        <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1355";>
        CVE-2007-1355</a></p>
@@ -35,6 +64,7 @@
        simplified not to use any user provided data in the output.</p>
 
     <p>Affects: 5.0.0-5.0.30, 5.5.0-5.5.23</p>
+
   </section>
 
   <section name="Fixed in Apache Tomcat 5.5.23, 5.0.HEAD">

Modified: tomcat/site/trunk/xdocs/security-6.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-6.xml?view=diff&rev=547089&r1=547088&r2=547089
==============================================================================
--- tomcat/site/trunk/xdocs/security-6.xml (original)
+++ tomcat/site/trunk/xdocs/security-6.xml Wed Jun 13 19:20:24 2007
@@ -24,6 +24,34 @@
 
   </section>
 
+  <section name="Fixed in Apache Tomcat 6.0.HEAD">
+    <p><strong>low: Cross-site scripting</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2449";>
+       CVE-2007-2449</a></p>
+
+    <p>JSPs within the examples web application did not escape user provided
+       data before including it in the output. This enabled a XSS attack. These
+       JSPs now filter the data before use. This issue may be mitigated by
+       undeploying the examples web application. Note that it is recommended
+       that the examples web application is not installed on a production
+       system.
+       </p>
+
+    <p>Affects: 6.0.0-6.0.13</p>
+
+    <p><strong>low: Cross-site scripting</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2450";>
+       CVE-2007-2450</a></p>
+
+    <p>The Manager and Host Manager web applications did not escape user
+       provided data before including it in the output. This enabled a XSS
+       attack. These applciations now filter the data before use. This issue 
may
+       be mitigated by logging out (closing the browser) of the application 
once
+       the management tasks have been completed.</p>
+
+    <p>Affects: 6.0.0-6.0.13</p>
+  </section>
+
   <section name="Fixed in Apache Tomcat 6.0.11">
     <p><strong>moderate: Cross-site scripting</strong>
        <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1355";>



---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to