-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.apache.tomcat:tomcat | maven | <= 3.2.1 |
The vulnerability involves unescaped user input in error messages triggered by JSP requests. Tomcat's JspServlet handles JSP processing and error generation. The service method would be responsible for error handling during request processing, where user-controlled input (e.g., malicious JSP filename/parameters) would be reflected in error messages without proper HTML encoding. This matches the CWE-80 pattern of improper script tag neutralization. While exact code isn't available, the architectural role of JspServlet in error generation makes this the most plausible location.
Ongoing coverage of React2Shell