CVE-2011-0013: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
(updated )
Multiple cross-site scripting (XSS) vulnerabilities in the HTML Manager Interface in Apache Tomcat 5.5 before 5.5.32, 6.0 before 6.0.30, and 7.0 before 7.0.6 allow remote attackers to inject arbitrary web script or HTML, as demonstrated via the display-name tag.
References
- lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
- marc.info/?l=bugtraq&m=130168502603566&w=2
- marc.info/?l=bugtraq&m=132215163318824&w=2
- marc.info/?l=bugtraq&m=136485229118404&w=2
- marc.info/?l=bugtraq&m=139344343412337&w=2
- securityreason.com/securityalert/8093
- support.apple.com/kb/HT5002
- support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5098550.html
- tomcat.apache.org/security-5.html
- tomcat.apache.org/security-6.html
- tomcat.apache.org/security-7.html
- www.debian.org/security/2011/dsa-2160
- www.redhat.com/support/errata/RHSA-2011-0791.html
- www.redhat.com/support/errata/RHSA-2011-0896.html
- www.redhat.com/support/errata/RHSA-2011-0897.html
- www.redhat.com/support/errata/RHSA-2011-1845.html
- bugzilla.redhat.com/show_bug.cgi?id=675786
- github.com/advisories/GHSA-3p86-xgrq-m6p6
- lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E
- lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E
- lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf@%3Cdev.tomcat.apache.org%3E
- lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5@%3Cdev.tomcat.apache.org%3E
- nvd.nist.gov/vuln/detail/CVE-2011-0013
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12878
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14945
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19269
Detect and mitigate CVE-2011-0013 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →