Apache Tomcat / Geronimo Sample Script cal2.jsp time Variable XSS

2006-01-15T10:02:36
ID OSVDB:22458
Type osvdb
Reporter OSVDB
Modified 2006-01-15T10:02:36

Description

Vulnerability Description

Apache Tomcat and Geronimo contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'time' variable upon submission to the cal2.jsp script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Upgrade to version 1.0.1, 1.1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

Apache Tomcat and Geronimo contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'time' variable upon submission to the cal2.jsp script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Manual Testing Notes

http://[target]:8080/jsp-examples/cal/cal2.jsp?time="/><script>alert('Gotcha')</script>

References:

Vendor URL: http://geronimo.apache.org/ Vendor URL: http://geronimo.apache.org Vendor Specific News/Changelog Entry: http://issues.apache.org/jira/browse/GERONIMO-1474 Secunia Advisory ID:18485 Related OSVDB ID: 22459 Other Advisory URL: http://www.oliverkarow.de/research/geronimo_css.txt Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-01/0259.html FrSIRT Advisory: ADV-2006-0217 CVE-2006-0254 Bugtraq ID: 16260