Vulnerability Details CVE-2005-4838
Multiple cross-site scripting (XSS) vulnerabilities in the example web applications for Jakarta Tomcat 5.5.6 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) el/functions.jsp, (2) el/implicit-objects.jsp, and (3) jspx/textRotate.jspx in examples/jsp2/, as demonstrated via script in a request to snp/snoop.jsp. NOTE: other XSS issues in the manager were simultaneously reported, but these require admin access and do not cross privilege boundaries.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.12
EPSS Ranking 93.4%
CVSS Severity
CVSS v2 Score 4.3
Products affected by CVE-2005-4838
-
cpe:2.3:a:apache:tomcat:-
-
cpe:2.3:a:apache:tomcat:1.1.3
-
cpe:2.3:a:apache:tomcat:3.0
-
cpe:2.3:a:apache:tomcat:3.1
-
cpe:2.3:a:apache:tomcat:3.1.1
-
cpe:2.3:a:apache:tomcat:3.2
-
cpe:2.3:a:apache:tomcat:3.2.1
-
cpe:2.3:a:apache:tomcat:3.2.2
-
cpe:2.3:a:apache:tomcat:3.2.3
-
cpe:2.3:a:apache:tomcat:3.2.4
-
cpe:2.3:a:apache:tomcat:3.3
-
cpe:2.3:a:apache:tomcat:3.3.1
-
cpe:2.3:a:apache:tomcat:3.3.1a
-
cpe:2.3:a:apache:tomcat:3.3.2
-
cpe:2.3:a:apache:tomcat:4
-
cpe:2.3:a:apache:tomcat:4.0.0
-
cpe:2.3:a:apache:tomcat:4.0.1
-
cpe:2.3:a:apache:tomcat:4.0.2
-
cpe:2.3:a:apache:tomcat:4.0.3
-
cpe:2.3:a:apache:tomcat:4.0.4
-
cpe:2.3:a:apache:tomcat:4.0.5
-
cpe:2.3:a:apache:tomcat:4.0.6
-
cpe:2.3:a:apache:tomcat:4.1.0
-
cpe:2.3:a:apache:tomcat:4.1.1
-
cpe:2.3:a:apache:tomcat:4.1.10
-
cpe:2.3:a:apache:tomcat:4.1.11
-
cpe:2.3:a:apache:tomcat:4.1.12
-
cpe:2.3:a:apache:tomcat:4.1.13
-
cpe:2.3:a:apache:tomcat:4.1.14
-
cpe:2.3:a:apache:tomcat:4.1.15
-
cpe:2.3:a:apache:tomcat:4.1.16
-
cpe:2.3:a:apache:tomcat:4.1.17
-
cpe:2.3:a:apache:tomcat:4.1.18
-
cpe:2.3:a:apache:tomcat:4.1.19
-
cpe:2.3:a:apache:tomcat:4.1.2
-
cpe:2.3:a:apache:tomcat:4.1.20
-
cpe:2.3:a:apache:tomcat:4.1.21
-
cpe:2.3:a:apache:tomcat:4.1.22
-
cpe:2.3:a:apache:tomcat:4.1.23
-
cpe:2.3:a:apache:tomcat:4.1.24
-
cpe:2.3:a:apache:tomcat:4.1.25
-
cpe:2.3:a:apache:tomcat:4.1.26
-
cpe:2.3:a:apache:tomcat:4.1.27
-
cpe:2.3:a:apache:tomcat:4.1.28
-
cpe:2.3:a:apache:tomcat:4.1.29
-
cpe:2.3:a:apache:tomcat:4.1.3
-
cpe:2.3:a:apache:tomcat:4.1.30
-
cpe:2.3:a:apache:tomcat:4.1.31
-
cpe:2.3:a:apache:tomcat:4.1.32
-
cpe:2.3:a:apache:tomcat:4.1.33
-
cpe:2.3:a:apache:tomcat:4.1.35
-
cpe:2.3:a:apache:tomcat:4.1.36
-
cpe:2.3:a:apache:tomcat:4.1.37
-
cpe:2.3:a:apache:tomcat:4.1.38
-
cpe:2.3:a:apache:tomcat:4.1.39
-
cpe:2.3:a:apache:tomcat:4.1.4
-
cpe:2.3:a:apache:tomcat:4.1.5
-
cpe:2.3:a:apache:tomcat:4.1.6
-
cpe:2.3:a:apache:tomcat:4.1.8
-
cpe:2.3:a:apache:tomcat:4.1.9
-
cpe:2.3:a:apache:tomcat:5
-
cpe:2.3:a:apache:tomcat:5.0.0
-
cpe:2.3:a:apache:tomcat:5.0.1
-
cpe:2.3:a:apache:tomcat:5.0.10
-
cpe:2.3:a:apache:tomcat:5.0.11
-
cpe:2.3:a:apache:tomcat:5.0.12
-
cpe:2.3:a:apache:tomcat:5.0.13
-
cpe:2.3:a:apache:tomcat:5.0.14
-
cpe:2.3:a:apache:tomcat:5.0.15
-
cpe:2.3:a:apache:tomcat:5.0.16
-
cpe:2.3:a:apache:tomcat:5.0.17
-
cpe:2.3:a:apache:tomcat:5.0.18
-
cpe:2.3:a:apache:tomcat:5.0.19
-
cpe:2.3:a:apache:tomcat:5.0.2
-
cpe:2.3:a:apache:tomcat:5.0.21
-
cpe:2.3:a:apache:tomcat:5.0.22
-
cpe:2.3:a:apache:tomcat:5.0.23
-
cpe:2.3:a:apache:tomcat:5.0.24
-
cpe:2.3:a:apache:tomcat:5.0.25
-
cpe:2.3:a:apache:tomcat:5.0.26
-
cpe:2.3:a:apache:tomcat:5.0.27
-
cpe:2.3:a:apache:tomcat:5.0.28
-
cpe:2.3:a:apache:tomcat:5.0.29
-
cpe:2.3:a:apache:tomcat:5.0.3
-
cpe:2.3:a:apache:tomcat:5.0.30
-
cpe:2.3:a:apache:tomcat:5.0.4
-
cpe:2.3:a:apache:tomcat:5.0.5
-
cpe:2.3:a:apache:tomcat:5.0.6
-
cpe:2.3:a:apache:tomcat:5.0.7
-
cpe:2.3:a:apache:tomcat:5.0.8
-
cpe:2.3:a:apache:tomcat:5.0.9
-
cpe:2.3:a:apache:tomcat:5.5.0
-
cpe:2.3:a:apache:tomcat:5.5.1
-
cpe:2.3:a:apache:tomcat:5.5.2
-
cpe:2.3:a:apache:tomcat:5.5.3
-
cpe:2.3:a:apache:tomcat:5.5.4
-
cpe:2.3:a:apache:tomcat:5.5.5
-
cpe:2.3:a:apache:tomcat:5.5.6