Caucho Resin Guest Book Multiple Variable XSS

2003-10-20T00:00:00
ID OSVDB:4983
Type osvdb
Reporter Donnie Werner(wood@e2-labs.com)
Modified 2003-10-20T00:00:00

Description

Vulnerability Description

Resin sample scripts contain a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the "name" or "comment" field upon submission to the guest book. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Upgrade to version 3.0 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

Resin sample scripts contain a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the "name" or "comment" field upon submission to the guest book. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

References:

Vendor URL: http://www.caucho.com/resin/index.xtp Snort Signature ID: 1497 Secunia Advisory ID:10031 Related OSVDB ID: 3393 Related OSVDB ID: 3394 Related OSVDB ID: 3390 Related OSVDB ID: 3388 Nessus Plugin ID:10815 Keyword: EXPL-A-2003-026 exploitlabs.com Advisory 026 ISS X-Force ID: 13460 Generic Informational URL: http://lists.netsys.com/pipermail/full-disclosure/2003-October/012361.html Bugtraq ID: 8852