Description
The SSI printenv command in Apache Tomcat 9.0.0.M1 to 9.0.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 echoes user provided data without escaping and is, therefore, vulnerable to XSS. SSI is disabled by default. The printenv command is intended for debugging and is unlikely to be present in a production website.
Published: 2019-05-28
Score: 6.1 Medium
EPSS: 18.5% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-1810-1 tomcat7 security update
Debian DLA Debian DLA DLA-1883-1 tomcat8 security update
Debian DSA Debian DSA DSA-4596-1 tomcat8 security update
Github GHSA Github GHSA GHSA-jjpq-gp5q-8q6w Cross-site scripting in Apache Tomcat
Ubuntu USN Ubuntu USN USN-4128-1 Tomcat vulnerabilities
Ubuntu USN Ubuntu USN USN-4128-2 Tomcat vulnerabilities
Ubuntu USN Ubuntu USN USN-6908-1 Tomcat vulnerabilities
References
Link Providers
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00090.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00054.html cve-icon cve-icon
http://packetstormsecurity.com/files/163457/Apache-Tomcat-9.0.0.M1-Cross-Site-Scripting.html cve-icon cve-icon
http://seclists.org/fulldisclosure/2019/May/50 cve-icon cve-icon
http://www.securityfocus.com/bid/108545 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3929 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3931 cve-icon cve-icon
https://lists.apache.org/thread.html/6e6e9eacf7b28fd63d249711e9d3ccd4e0a83f556e324aee37be5a8c%40%3Cannounce.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2019/05/msg00044.html cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2019/08/msg00015.html cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46/ cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2019-0221 cve-icon
https://seclists.org/bugtraq/2019/Dec/43 cve-icon cve-icon
https://security.gentoo.org/glsa/202003-43 cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20190606-0001/ cve-icon cve-icon
https://support.f5.com/csp/article/K13184144?utm_source=f5support&amp%3Butm_medium=RSS cve-icon cve-icon
https://usn.ubuntu.com/4128-1/ cve-icon cve-icon
https://usn.ubuntu.com/4128-2/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2019-0221 cve-icon
https://www.debian.org/security/2019/dsa-4596 cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuApr2021.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuapr2020.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujan2020.html cve-icon cve-icon
https://wwws.nightwatchcybersecurity.com/2019/05/27/xss-in-ssi-printenv-command-apache-tomcat-cve-2019-0221/ cve-icon cve-icon
History

No history.

Subscriptions

Apache Tomcat
Redhat Jboss Enterprise Web Server
cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-04T17:44:15.953Z

Reserved: 2018-11-14T00:00:00.000Z

Link: CVE-2019-0221

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-05-28T22:29:00.563

Modified: 2024-11-21T04:16:31.373

Link: CVE-2019-0221

cve-icon Redhat

Severity : Low

Publid Date: 2019-04-13T00:00:00Z

Links: CVE-2019-0221 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses