CVE-2008-1232
Description
Cross-site scripting (XSS) vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via a crafted string that is used in the message argument to the HttpServletResponse.sendError method.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Apache Tomcat versions 4.1.0–4.1.37, 5.5.0–5.5.26, and 6.0.0–6.0.16 are vulnerable to cross-site scripting (XSS) via crafted strings in the message argument to HttpServletResponse.sendError.
Vulnerability
A cross-site scripting (XSS) vulnerability exists in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16 [1][2][3]. The flaw is located in the HttpServletResponse.sendError method, where a crafted string supplied as the message argument is not properly sanitized before being included in the HTTP response body [1][2]. This allows an attacker to inject arbitrary web script or HTML that will be executed in the context of the victim's browser [2].
Exploitation
An attacker can exploit this vulnerability by sending a specially crafted request to a vulnerable Tomcat server that causes the sendError method to be called with a malicious message parameter [2]. The attacker does not need prior authentication or special privileges; the attack can be performed remotely over HTTP [1][2]. No user interaction is required beyond the victim's browser rendering the crafted error page [1][2].
Impact
Successful exploitation allows a remote attacker to inject arbitrary web script or HTML into the error page generated by Tomcat [1][2]. The injected script executes in the security context of the vulnerable web application domain, potentially enabling session hijacking, cookie theft, or other client-side attacks [2]. The attacker gains no direct access to the server itself, but can compromise the interactions of legitimate users with the affected application [1][2].
Mitigation
Users should upgrade to a patched version: Tomcat 4.1.x users should upgrade to 4.1.38 or later, Tomcat 5.5.x users to 5.5.27 or later, and Tomcat 6.0.x users to 6.0.17 or later [1][3]. Red Hat Enterprise Linux users can apply the fix via RHSA-2008:0648 [4]. Note that Tomcat 6.0.x has reached end of life, and no further security updates for that branch will be provided; users are strongly advised to migrate to a supported release (9.0.x or later) [1]. For Tomcat 5.x branches, which are also unsupported, an upgrade to a current release is recommended [3].
AI Insight generated on May 24, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.tomcat:tomcatMaven | >= 4.1.0, < 4.1.38 | 4.1.38 |
org.apache.tomcat:tomcatMaven | >= 5.5.0, < 5.5.27 | 5.5.27 |
org.apache.tomcat:tomcatMaven | >= 6.0.0, < 6.0.17 | 6.0.17 |
Affected products
3Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
81- www.securityfocus.com/bid/30496nvdExploitPatchThird Party AdvisoryVDB EntryWEB
- lists.apple.com/archives/security-announce/2008/Oct/msg00001.htmlnvdMailing ListThird Party AdvisoryWEB
- lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.htmlnvdThird Party AdvisoryWEB
- lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.htmlnvdThird Party AdvisoryWEB
- marc.infonvdMailing ListThird Party AdvisoryWEB
- marc.infonvdMailing ListThird Party AdvisoryWEB
- securityreason.com/securityalert/4098nvdThird Party AdvisoryWEB
- support.apple.com/kb/HT3216nvdThird Party AdvisoryWEB
- support.avaya.com/elmodocs2/security/ASA-2008-401.htmnvdThird Party AdvisoryWEB
- tomcat.apache.org/security-4.htmlnvdVendor AdvisoryWEB
- tomcat.apache.org/security-5.htmlnvdVendor AdvisoryWEB
- tomcat.apache.org/security-6.htmlnvdVendor AdvisoryWEB
- www.mandriva.com/security/advisoriesnvdThird Party AdvisoryWEB
- www.redhat.com/support/errata/RHSA-2008-0648.htmlnvdThird Party AdvisoryWEB
- www.redhat.com/support/errata/RHSA-2008-0862.htmlnvdThird Party AdvisoryWEB
- www.redhat.com/support/errata/RHSA-2008-0864.htmlnvdThird Party AdvisoryWEB
- www.securityfocus.com/archive/1/495021/100/0/threadednvdThird Party AdvisoryVDB EntryWEB
- www.securityfocus.com/archive/1/504351/100/0/threadednvdThird Party AdvisoryVDB EntryWEB
- www.securityfocus.com/archive/1/505556/100/0/threadednvdThird Party AdvisoryVDB EntryWEB
- www.securityfocus.com/archive/1/507985/100/0/threadednvdThird Party AdvisoryVDB EntryWEB
- www.securityfocus.com/bid/31681nvdThird Party AdvisoryVDB EntryWEB
- www.securitytracker.com/idnvdThird Party AdvisoryVDB EntryWEB
- www.vmware.com/security/advisories/VMSA-2009-0002.htmlnvdThird Party AdvisoryWEB
- www.vmware.com/security/advisories/VMSA-2009-0016.htmlnvdThird Party AdvisoryWEB
- exchange.xforce.ibmcloud.com/vulnerabilities/44155nvdThird Party AdvisoryVDB EntryWEB
- github.com/advisories/GHSA-q74x-qqhr-f8rxghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2008-1232ghsaADVISORY
- www.redhat.com/archives/fedora-package-announce/2008-September/msg00712.htmlnvdThird Party AdvisoryWEB
- www.redhat.com/archives/fedora-package-announce/2008-September/msg00859.htmlnvdThird Party AdvisoryWEB
- www.redhat.com/archives/fedora-package-announce/2008-September/msg00889.htmlnvdThird Party AdvisoryWEB
- community.ca.com/blogs/casecurityresponseblog/archive/2009/06/15/ca20090615-02-ca-service-desk-tomcat-cross-site-scripting-vulnerability.aspxnvdBroken LinkWEB
- secunia.com/advisories/31379nvdBroken LinkWEB
- secunia.com/advisories/31381nvdBroken LinkWEB
- secunia.com/advisories/31639nvdBroken LinkWEB
- secunia.com/advisories/31865nvdBroken LinkWEB
- secunia.com/advisories/31891nvdBroken LinkWEB
- secunia.com/advisories/31982nvdBroken LinkWEB
- secunia.com/advisories/32120nvdBroken LinkWEB
- secunia.com/advisories/32222nvdBroken LinkWEB
- secunia.com/advisories/32266nvdBroken LinkWEB
- secunia.com/advisories/33797nvdBroken LinkWEB
- secunia.com/advisories/33999nvdBroken LinkWEB
- secunia.com/advisories/34013nvdBroken LinkWEB
- secunia.com/advisories/35474nvdBroken LinkWEB
- secunia.com/advisories/36108nvdBroken LinkWEB
- secunia.com/advisories/37460nvdBroken LinkWEB
- secunia.com/advisories/57126nvdBroken LinkWEB
- www.vupen.com/english/advisories/2008/2305nvdURL RepurposedWEB
- www.vupen.com/english/advisories/2008/2780nvdURL RepurposedWEB
- www.vupen.com/english/advisories/2008/2823nvdURL RepurposedWEB
- www.vupen.com/english/advisories/2009/0320nvdURL RepurposedWEB
- www.vupen.com/english/advisories/2009/0503nvdURL RepurposedWEB
- www.vupen.com/english/advisories/2009/1609nvdURL RepurposedWEB
- www.vupen.com/english/advisories/2009/2194nvdURL RepurposedWEB
- www.vupen.com/english/advisories/2009/3316nvdURL RepurposedWEB
- access.redhat.com/errata/RHSA-2008:0648ghsaWEB
- access.redhat.com/errata/RHSA-2008:0862ghsaWEB
- access.redhat.com/errata/RHSA-2008:0864ghsaWEB
- access.redhat.com/errata/RHSA-2008:0877ghsaWEB
- access.redhat.com/errata/RHSA-2008:1007ghsaWEB
- access.redhat.com/errata/RHSA-2010:0602ghsaWEB
- access.redhat.com/security/cve/CVE-2008-1232ghsaWEB
- bugzilla.redhat.com/show_bug.cgighsaWEB
- lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3EnvdWEB
- lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3EghsaWEB
- lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3EnvdWEB
- lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3EghsaWEB
- lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3EnvdWEB
- lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3EghsaWEB
- lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3EnvdWEB
- lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3EnvdWEB
- lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf@%3Cdev.tomcat.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3EnvdWEB
- lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5@%3Cdev.tomcat.apache.org%3EghsaWEB
- lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3EnvdWEB
- lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3@%3Cdev.tomcat.apache.org%3EghsaWEB
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11181nvdTool SignatureWEB
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5985nvdTool SignatureWEB
- support.ca.com/irj/portal/anonymous/phpsupcontentnvdBroken LinkWEB
- support.ca.com/irj/portal/anonymous/phpsupcontentnvdBroken LinkWEB
News mentions
0No linked articles in our index yet.