Note: This is an archival copy of Security Sun Alert 251986 as previously published on http://sunsolve.sun.com.|
Latest version of this security advisory is available from http://support.oracle.com as Sun Alert 1020086.1.
Solaris 9 Operating System
Solaris 10 Operating System
Date of Resolved Release
Security vulnerabilities in Tomcat 5.5 may lead to Cross Site Scripting (XSS) or directory traversal:
There are three security vulnerabilities in the Tomcat JSP/Servlet container that affect Tomcat 5.5 bundled in Solaris 9 and Solaris 10.
The first two security vulnerabilities are Cross Site Scripting (XSS) issues. One in the HttpServletResponse.sendError method (CVE-2008-1232) and the other in the Tomcat Virtual Host Manager (CVE-2008-1947). These may allow a local or remote unprivileged user to inject arbitrary web script or HTML, which in turn may allow the unprivileged user to bypass access control and gain access to unauthorized data.
The third security vulnerability is a Directory Traversal vulnerability in the RequestDispatcher class (CVE-2008-2370) that may allow a local or remote unprivileged user to bypass access control and gain access to unauthorized data.
Additional information regarding these issues is available at:
These issues can occur in the following releases:
Note 2: OpenSolaris distributions may include additional bug fixes above and beyond the build from which it was derived. To determine the base build of OpenSolaris, the following command can be used:
$ uname -vNote 3: A system is only vulnerable to this issues if Tomcat 5.5 has been configured and is running on the system.
To determine if Tomcat is installed on the system, a command such as the following can be used:
% pkginfo SUNWtcatrTomcat can be configured to start in various different ways. For assistance in determining if Tomcat is configured to run on the system, consult the documentation which is usually available in the "/var/apache/tomcat/webapps/tomcat-docs" directory.
There are no predictable symptoms that would indicate the described issues have been exploited.
There are no workarounds for these issues. Please see the Resolution section below.
These issues are resolved in the following releases:
Copyright 2000-2009 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, CA 95054 U.S.A. All rights reserved.
This solution has no attachment