Sun Java System Identity Manager 6.07.07.1 - idmaccountfindForSelect.jsp?resultsForm Cross-Site Scripting

2008-01-09T00:00:00
ID EXPLOITPACK:40D457CFA88231BAE625FEA5DCDB65C7
Type exploitpack
Reporter Jan Fry Adrian Pastor
Modified 2008-01-09T00:00:00

Description

Sun Java System Identity Manager 6.07.07.1 - idmaccountfindForSelect.jsp?resultsForm Cross-Site Scripting

                                        
                                            source: https://www.securityfocus.com/bid/27214/info
 
Sun Java System Identity Manager is prone to multiple input-validation vulnerabilities, including an HTML-injection issue and cross-site scripting issues, because it fails to adequately sanitize user-supplied input.
 
Attackers can exploit these issues to execute arbitrary HTML and script code in the context of the affected site. Successful exploits could allow an attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user; other attacks are also possible.
 
Sun Java System Identity Manager 6.0 SP1, 6.0 SP2, 6.0 SP3, 7.0, and 7.1 are vulnerable. 

https://www.example.com/idm/account/findForSelect.jsp?resultsForm=<script>alert('Running_scripting_within_the_context_of_'%2bdocument.domain)</script>&predefinedQuery=name%3Astarts+with%3A%25