Caucho Resin form.jsp XSS

2003-10-20T00:00:00
ID OSVDB:3388
Type osvdb
Reporter Donnie Werner(wood@e2-labs.com)
Modified 2003-10-20T00:00:00

Description

Vulnerability Description

Resin sample scripts contain a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate user input upon submission to the form.jsp script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Upgrade to version 3.0 or higher, as it has been reported to fix this vulnerability. It is also possible to correct the flaw by implementing the following workaround(s): remove the form.jsp script if it is not needed

Short Description

Resin sample scripts contain a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate user input upon submission to the form.jsp script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

References:

Vendor URL: http://www.caucho.com/resin/index.xtp Snort Signature ID: 1497 Secunia Advisory ID:10031 Related OSVDB ID: 3393 Related OSVDB ID: 3394 Related OSVDB ID: 3390 Related OSVDB ID: 4983 Nessus Plugin ID:10815 Keyword: EXPL-A-2003-026 exploitlabs.com Advisory 026 ISS X-Force ID: 13460 Generic Informational URL: http://lists.netsys.com/pipermail/full-disclosure/2003-October/012361.html Bugtraq ID: 8852