VID |
21829 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The Apache Geronimo is vulnerable to a cross-site scripting vulnerability via the jsp-examples scripts. Geronimo is an open-source J2EE server from the Apache Software Foundation. Apache Geronimo version 1.0 is vulnerable to a cross-site scripting vulnerability, caused by improper validation of user-supplied input passed to the time parameter of the jsp-examples scripts. This vulnerability could permit a remote attacker to create a malicious URI link that includes hostile HTML and script code. If this link were to be followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks.
* References: http://www.oliverkarow.de/research/geronimo_css.txt http://issues.apache.org/jira/browse/GERONIMO-1474
* Platforms Affected: The Apache Software Foundation, Geronimo version 1.0 Any operating system Any version |
Recommendation |
If it is not required then remove the jsp-examples scripts.
-- OR --
Upgrade to the latest version of Geronimo (1.1 or later), available from the Apache Software Foundation Web site at http://geronimo.apache.org/ |
Related URL |
CVE-2006-0254 (CVE) |
Related URL |
16260 (SecurityFocus) |
Related URL |
24158 (ISS) |
|