The Sun Secure Global Desktop (SSGD) contains cross-site scripting vulnerabilities.
Sun Secure Global Desktop (formerly Tarantella) contains multiple input validation vulnerabilities due to failure to properly sanitize user input. The following modules do not properly filter HTML code from user input, facilitating cross-site scripting attacks:
* `taarchives.cgi` * `ttaAuthentication.jsp` * `ttalicense.cgi` * `ttawlogin.cgi` * `ttawebtop.cgi` * `ttaabout.cgi` * `test-cgi`
Sun states that this issue affects Sun Secure Global Desktop Software 4.2 prior to build 4.20.983 for Solaris 8 and 9 on the SPARC platform, Solaris 10 on the SPARC and x86 platforms, and the Linux platform.
A remote attacker may be able to execute arbitrary script commands in the context of a victim user. Secondary impacts include: theft of cookie information, session hijacking, and loss of data privacy between a client and the intended server.
Apply an update
Sun has addressed this vulnerability in the latest build of Sun Secure Global Desktop.
Vendor| Status| Date Notified| Date Updated
Sun Microsystems, Inc.| | -| 31 Oct 2006
If you are a vendor and your product is affected, let us know.
Group | Score | Vector
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | N/A | N/A
This issue was reported by SUN in document 102650 . Sun thanks Marc Ruef of scip AG for reporting this issue.
This document was written by Katie Steiner.