Resin Application Server 4.0.36 Cross-Site Scripting Vulnerabilities

2013.06.08
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

Resin Application Server 4.0.36 Cross-Site Scripting Vulnerabilities Vendor: Caucho Technology, Inc. Product web page: http://www.caucho.com Affected version: Resin Professional Web And Application Server 4.0.36 Summary: Resin is the Java Application Server for high traffic sites that require speed and scalability. It is one of the earliest Java Application Servers, and has stood the test of time due to engineering prowess. Desc: Resin Application and Web Server The plugin suffers from a XSS issue due to a failure to properly sanitize user-supplied input to the 'logout' GET parameter in the 'index.php' script. URI-based XSS issue is also present and both of the vulnerabilities can be triggered once the user/admin is logged in (post-auth). Attackers can exploit this weakness to execute arbitrary HTML and script code in a user's browser session. Tested on: Resin Professional 4.0.36 (built Fri, 26 Apr 2013 03:33:09 PDT) Java HotSpot(TM) 64-Bit Server VM 23.3-b01 4 cpu, Windows 7 amd64 6.1 Vulnerability discovered by Gjoko 'LiquidWorm' Krstic @zeroscience Advisory ID: ZSL-2013-5143 Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5143.php 01.06.2013 -- http://127.0.0.1:8080/resin-admin/?q=index.php&logout=true%22%3E%3Cscript%3Ealert%28document.cookie%29;%3C/script%3E http://127.0.0.1:8080/resin-admin\?%22%3E%3Cscript%3Ealert%281%29;%3C/script%3E

References:

http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5143.php


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top