The SSI printenv command in Apache Tomcat 9.0.0.M1 to 9.0.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 echoes user provided data without escaping and is, therefore, vulnerable to XSS. SSI is disabled by default. The printenv command is intended for debugging and is unlikely to be present in a production website.
References
Link Providers
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00090.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00054.html cve-icon cve-icon
http://packetstormsecurity.com/files/163457/Apache-Tomcat-9.0.0.M1-Cross-Site-Scripting.html cve-icon cve-icon
http://seclists.org/fulldisclosure/2019/May/50 cve-icon cve-icon
http://www.securityfocus.com/bid/108545 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3929 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3931 cve-icon cve-icon
https://lists.apache.org/thread.html/6e6e9eacf7b28fd63d249711e9d3ccd4e0a83f556e324aee37be5a8c%40%3Cannounce.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2019/05/msg00044.html cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2019/08/msg00015.html cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46/ cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2019-0221 cve-icon
https://seclists.org/bugtraq/2019/Dec/43 cve-icon cve-icon
https://security.gentoo.org/glsa/202003-43 cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20190606-0001/ cve-icon cve-icon
https://support.f5.com/csp/article/K13184144?utm_source=f5support&amp%3Butm_medium=RSS cve-icon cve-icon
https://usn.ubuntu.com/4128-1/ cve-icon cve-icon
https://usn.ubuntu.com/4128-2/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2019-0221 cve-icon
https://www.debian.org/security/2019/dsa-4596 cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuApr2021.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuapr2020.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujan2020.html cve-icon cve-icon
https://wwws.nightwatchcybersecurity.com/2019/05/27/xss-in-ssi-printenv-command-apache-tomcat-cve-2019-0221/ cve-icon cve-icon
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published: 2019-05-28T21:01:28

Updated: 2024-08-04T17:44:15.953Z

Reserved: 2018-11-14T00:00:00

Link: CVE-2019-0221

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-05-28T22:29:00.563

Modified: 2023-12-08T16:41:18.860

Link: CVE-2019-0221

cve-icon Redhat

Severity : Low

Publid Date: 2019-04-13T00:00:00Z

Links: CVE-2019-0221 - Bugzilla