Miggo Logo

CVE-2001-0829: Apache Tomcat allows webmasters to insert xss into error messages

N/A

CVSS Score

Basic Information

EPSS Score
0.71872%
Published
4/30/2022
Updated
9/18/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.apache.tomcat:tomcatmaven<= 3.2.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability involves unescaped user input in error messages triggered by JSP requests. Tomcat's JspServlet handles JSP processing and error generation. The service method would be responsible for error handling during request processing, where user-controlled input (e.g., malicious JSP filename/parameters) would be reflected in error messages without proper HTML encoding. This matches the CWE-80 pattern of improper script tag neutralization. While exact code isn't available, the architectural role of JspServlet in error generation makes this the most plausible location.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* *ross-sit* s*riptin* vuln*r**ility in *p**** Tom**t *.*.* *llows * m*li*ious w**m*st*r to *m*** J*v*s*ript in * r*qu*st *or * .JSP *il*, w*i** **us*s t** J*v*s*ript to ** ins*rt** into *n *rror m*ss***.

Reasoning

T** vuln*r**ility involv*s un*s**p** us*r input in *rror m*ss***s tri***r** *y JSP r*qu*sts. Tom**t's JspS*rvl*t **n*l*s JSP pro**ssin* *n* *rror **n*r*tion. T** s*rvi** m*t*o* woul* ** r*sponsi*l* *or *rror **n*lin* *urin* r*qu*st pro**ssin*, w**r*