Vulnerability Scanning Solutions, LLC.
Our Process
What We Scan For
Sample Report
Client List
Contact Us
What We Scan For
Family: CGI abuses : XSS --> Category: attack

Geronimo cal2.jsp Example Cross-Site Scripting Vulnerability Vulnerability Scan

Vulnerability Scan Summary
Checks for cal2.jsp cross-site scripting vulnerability in Geronimo

Detailed Explanation for this Vulnerability Test

Synopsis :

The remote web server contains a JSP application that is prone to a
cross-site scripting flaw.

Description :

The remote host appears to be running Geronimo, an open-source J2EE
server from the Apache Software Foundation.

The version of Geronimo installed on the remote host includes a JSP
application that fails to sanitize user-supplied input to the 'time'
parameter before using it to generate a dynamic webpage. A possible hacker
can exploit this flaw to cause arbitrary HTML and script code to be
executed in a user's browser within the context of the affected web

See also :

Solution :

Uninstall the example applications or upgrade to Geronimo version
1.0.1 or later.

Threat Level:

Low / CVSS Base Score : 2.3

Click HERE for more information and discussions on this network vulnerability scan.


P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.