Family: CGI abuses : XSS --> Category: attack
Geronimo cal2.jsp Example Cross-Site Scripting Vulnerability Vulnerability Scan
Vulnerability Scan Summary
Checks for cal2.jsp cross-site scripting vulnerability in Geronimo
Detailed Explanation for this Vulnerability Test
The remote web server contains a JSP application that is prone to a
cross-site scripting flaw.
The remote host appears to be running Geronimo, an open-source J2EE
server from the Apache Software Foundation.
The version of Geronimo installed on the remote host includes a JSP
application that fails to sanitize user-supplied input to the 'time'
parameter before using it to generate a dynamic webpage. A possible hacker
can exploit this flaw to cause arbitrary HTML and script code to be
executed in a user's browser within the context of the affected web
See also :
Uninstall the example applications or upgrade to Geronimo version
1.0.1 or later.
Low / CVSS Base Score : 2.3
Click HERE for more information and discussions on this network vulnerability scan.