ID OSVDB:3390 Type osvdb Reporter Donnie Werner(wood@e2-labs.com) Modified 2003-10-20T00:00:00
Description
Vulnerability Description
Resin sample scripts contain a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate user input upon submission to the session.jsp script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
Solution Description
Upgrade to version 3.0 or higher, as it has been reported to fix this vulnerability. It is also possible to correct the flaw by implementing the following workaround(s): remove the session.jsp script if it is not needed
Short Description
Resin sample scripts contain a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate user input upon submission to the session.jsp script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
{"edition": 1, "title": "Caucho Resin session.jsp XSS ", "bulletinFamily": "software", "published": "2003-10-20T00:00:00", "lastseen": "2017-04-28T13:19:57", "modified": "2003-10-20T00:00:00", "reporter": "Donnie Werner(wood@e2-labs.com)", "viewCount": 2, "href": "https://vulners.com/osvdb/OSVDB:3390", "description": "## Vulnerability Description\nResin sample scripts contain a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate user input upon submission to the session.jsp script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Solution Description\nUpgrade to version 3.0 or higher, as it has been reported to fix this vulnerability. It is also possible to correct the flaw by implementing the following workaround(s): remove the session.jsp script if it is not needed\n## Short Description\nResin sample scripts contain a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate user input upon submission to the session.jsp script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## References:\nVendor URL: http://www.caucho.com/resin/index.xtp\nSnort Signature ID: 1497\n[Secunia Advisory ID:10031](https://secuniaresearch.flexerasoftware.com/advisories/10031/)\n[Related OSVDB ID: 3393](https://vulners.com/osvdb/OSVDB:3393)\n[Related OSVDB ID: 3394](https://vulners.com/osvdb/OSVDB:3394)\n[Related OSVDB ID: 4983](https://vulners.com/osvdb/OSVDB:4983)\n[Related OSVDB ID: 3388](https://vulners.com/osvdb/OSVDB:3388)\n[Nessus Plugin ID:10815](https://vulners.com/search?query=pluginID:10815)\nKeyword: EXPL-A-2003-026 exploitlabs.com Advisory 026\nISS X-Force ID: 13460\nGeneric Informational URL: http://lists.netsys.com/pipermail/full-disclosure/2003-October/012361.html\nBugtraq ID: 8852\n", "affectedSoftware": [{"name": "Resin", "version": "2.0 b2", "operator": "eq"}, {"name": "Resin", "version": "2.1.1", "operator": "eq"}, {"name": "Resin", "version": "2.1.2", "operator": "eq"}, {"name": "Resin", "version": "2.1.s020711", "operator": "eq"}, {"name": "Resin", "version": "2.0", "operator": "eq"}], "type": "osvdb", "references": [], "enchantments": {"score": {"value": -0.2, "vector": "NONE", "modified": "2017-04-28T13:19:57", "rev": 2}, "dependencies": {"references": [], "modified": "2017-04-28T13:19:57", "rev": 2}, "vulnersScore": -0.2}, "cvss": {"vector": "NONE", "score": 0.0}, "cvelist": [], "id": "OSVDB:3390"}