lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20070904030044.22274.qmail@securityfocus.com> Date: 4 Sep 2007 03:00:44 -0000 From: tusharvartak@...mail.com To: bugtraq@...urityfocus.com Subject: Apache tomcat calendar example cross site scripting and cross site request forgery vulnerability Apache Tomcat/4.1.31 ships with built in examples. One of the example calendar.jsp suffers from input validation error and could be exploited for cross site scriptingand cross site request forgery. XSS http://myserver:myport/examples/jsp/cal/cal2.jsp?time=8am%3cscript%3ealert("XSS!")%3c%2fscript%3e XSRF http://myserver:myport/examples/jsp/cal/cal2.jsp?time=><img%20src="http://xsrfxonfirmed.com/testimage.gif"> - Tushar Vartak