A cross-site scripting vulnerability exists in the Macromedia JRun Server Management Console that may allow an attacker to execute arbitrary code.
JRun is an application server that works with most popular web servers such as Apache and IIS. Macromedia states that JRun is deployed at over 10,000 organizations worldwide. The JRun Management Console (JMC) is a web-based utility used to manage and configure the JRun Server. There are reports of a cross-site scripting vulnerability in the JMC. According these reports, the JMC fails to filter variables encoded in a URL for malicious content. As a result, a remote attacker may be able to insert and execute arbitrary code within the security context of the JMC site. According to Macromedia only JRun version 4.0 is vulnerable.
A remote attacker may be able to execute arbitrary code within the security context of the JMC site. If the site is compromised, an attacker may be able to access a user's cookies allowing them to view sensitive information or hijack an authenticated user's session.
Apply the latest JRun updater:
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Notified: September 29, 2004 Updated: October 04, 2004
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Group | Score | Vector
Base | |
Temporal | |
Environmental | |
This vulnerability was reported in Macromedia Security Bulletin MPSB04-08.Macromedia credits Acros for helping to discover and report this issue.
This document was written by Jeff Gennari.
CVE IDs: | None
Severity Metric: | 5.76
Date Public: | 2004-09-23
Date First Published: | 2004-10-12
Date Last Updated: | 2004-10-12 16:52 UTC
Document Revision: | 97