Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: CGI abuses : XSS --> Category: attack

Geronimo cal2.jsp Example Cross-Site Scripting Vulnerability Vulnerability Scan


Vulnerability Scan Summary
Checks for cal2.jsp cross-site scripting vulnerability in Geronimo

Detailed Explanation for this Vulnerability Test

Synopsis :

The remote web server contains a JSP application that is prone to a
cross-site scripting flaw.

Description :

The remote host appears to be running Geronimo, an open-source J2EE
server from the Apache Software Foundation.

The version of Geronimo installed on the remote host includes a JSP
application that fails to sanitize user-supplied input to the 'time'
parameter before using it to generate a dynamic webpage. A possible hacker
can exploit this flaw to cause arbitrary HTML and script code to be
executed in a user's browser within the context of the affected web
site.

See also :

http://www.oliverkarow.de/research/geronimo_css.txt
http://issues.apache.org/jira/browse/GERONIMO-1474

Solution :

Uninstall the example applications or upgrade to Geronimo version
1.0.1 or later.

Threat Level:

Low / CVSS Base Score : 2.3
(AV:R/AC:L/Au:NR/C:N/I:P/A:N/B:N)

Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.