Vulnerabilities > CVE-2002-0682 - Unspecified vulnerability in Apache Tomcat 4.0.3
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Cross-site scripting vulnerability in Apache Tomcat 4.0.3 allows remote attackers to execute script as other web users via script in a URL with the /servlet/ mapping, which does not filter the script when an exception is thrown by the servlet.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | Apache Tomcat 4.0.3 Servlet Mapping Cross Site Scripting Vulnerability. CVE-2002-0682. Remote exploit for linux platform |
id | EDB-ID:21604 |
last seen | 2016-02-02 |
modified | 2002-07-10 |
published | 2002-07-10 |
reporter | Matt Moore |
source | https://www.exploit-db.com/download/21604/ |
title | Apache Tomcat 4.0.3 - Servlet Mapping Cross-Site Scripting Vulnerability |
Nessus
NASL family | CGI abuses : XSS |
NASL id | APACHE_TOMCAT_SERVLET_XSS.NASL |
description | Apache Tomcat is the servlet container that is used in the official Reference Implementation for the Java Servlet and JavaServer Pages technologies. By using the /servlet/ mapping to invoke various servlets / classes it is possible to cause Tomcat to throw an exception, allowing XSS attacks. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 11041 |
published | 2002-07-10 |
reporter | This script is Copyright (C) 2002-2018 Matt Moore |
source | https://www.tenable.com/plugins/nessus/11041 |
title | Apache Tomcat /servlet Mapping XSS |
code |
|
References
- http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0014.html
- http://www.securityfocus.com/bid/5193
- http://www.osvdb.org/4973
- http://marc.info/?l=bugtraq&m=102631703811297&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/9520
- https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E