|
Family: CGI abuses : XSS --> Category: attack
Geronimo cal2.jsp Example Cross-Site Scripting Vulnerability Vulnerability Scan
Vulnerability Scan Summary Checks for cal2.jsp cross-site scripting vulnerability in Geronimo
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a JSP application that is prone to a
cross-site scripting flaw.
Description :
The remote host appears to be running Geronimo, an open-source J2EE
server from the Apache Software Foundation.
The version of Geronimo installed on the remote host includes a JSP
application that fails to sanitize user-supplied input to the 'time'
parameter before using it to generate a dynamic webpage. A possible hacker
can exploit this flaw to cause arbitrary HTML and script code to be
executed in a user's browser within the context of the affected web
site.
See also :
http://www.oliverkarow.de/research/geronimo_css.txt
http://issues.apache.org/jira/browse/GERONIMO-1474
Solution :
Uninstall the example applications or upgrade to Geronimo version
1.0.1 or later.
Threat Level:
Low / CVSS Base Score : 2.3
(AV:R/AC:L/Au:NR/C:N/I:P/A:N/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|