CVE-2008-1947

N/A Unknown
Published: June 04, 2008 Modified: April 23, 2026
View on NVD

Description

Cross-site scripting (XSS) vulnerability in Apache Tomcat 5.5.9 through 5.5.26 and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via the name parameter (aka the hostname attribute) to host-manager/html/add.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/30500
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/30592
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/30967
Source: secalert@redhat.com
http://secunia.com/advisories/31639
Source: secalert@redhat.com
http://secunia.com/advisories/31865
Source: secalert@redhat.com
http://secunia.com/advisories/31891
Source: secalert@redhat.com
http://secunia.com/advisories/32120
Source: secalert@redhat.com
http://secunia.com/advisories/32222
Source: secalert@redhat.com
http://secunia.com/advisories/32266
Source: secalert@redhat.com
http://secunia.com/advisories/33797
Source: secalert@redhat.com
http://secunia.com/advisories/33999
Source: secalert@redhat.com
http://secunia.com/advisories/34013
Source: secalert@redhat.com
http://secunia.com/advisories/37460
Source: secalert@redhat.com
http://secunia.com/advisories/57126
Source: secalert@redhat.com
http://support.apple.com/kb/HT3216
Source: secalert@redhat.com
http://tomcat.apache.org/security-5.html
Source: secalert@redhat.com
http://tomcat.apache.org/security-6.html
Source: secalert@redhat.com
http://www.securityfocus.com/bid/29502
Source: secalert@redhat.com
http://www.securityfocus.com/bid/31681
Source: secalert@redhat.com
http://marc.info/?l=bugtraq&m=123376588623823&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://marc.info/?l=bugtraq&m=139344343412337&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://marc.info/?l=tomcat-user&m=121244319501278&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/30500
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/30592
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/30967
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/31639
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/31865
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/31891
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/32120
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/32222
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/32266
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/33797
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/33999
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/34013
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/37460
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/57126
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.apple.com/kb/HT3216
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm
Source: af854a3a-2127-422b-91ae-364da2661108
http://tomcat.apache.org/security-5.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://tomcat.apache.org/security-6.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2008/dsa-1593
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2008:188
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2008-0648.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2008-0862.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2008-0864.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/492958/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/507985/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/29502
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/31681
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id?1020624
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vmware.com/security/advisories/VMSA-2009-0002.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vmware.com/security/advisories/VMSA-2009-0016.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/1725
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/2780
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/2823
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2009/0320
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2009/0503
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2009/3316
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/42816
Source: af854a3a-2127-422b-91ae-364da2661108

104 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
59.3%
98th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

apache