VID |
22379 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The Xerver web server is vulnerable to multiple vulnerabilities. Xerver is a freely available Java-based Web server developed by Omid Rouhani. Xerver version 4.17 and possibly other versions are vulnerable to multiple vulnerabilities, which can be exploited by a remote attacker to conduct cross-site scripting attacks, and disclose system and sensitive information.
1) The problem is that it is possible to disclose the source code of script files by appending a dot to the filename in a HTTP request. 2) The problem is that the content of a directory can be disclosed even when there is an index file by appending a null character (%00) to the path in a HTTP request. 3) By creating a specially crafted URL containing a null character (%00) followed by malicious code, an attacker can perform cross-site scripting attacks. This can further be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
* References: http://www.osvdb.org/20075 http://www.osvdb.org/20076 http://www.osvdb.org/20077 http://secunia.com/advisories/17243/
* Platforms Affected: Omid Rouhani, Xerver version 4.17 and possibly other versions Any operating system Any version |
Recommendation |
Upgrade to the latest version of Xerver (4.20 or later), available from the Xerver Web page at http://www.javascript.nu/xerver/ |
Related URL |
CVE-2005-3293 (CVE) |
Related URL |
15135 (SecurityFocus) |
Related URL |
22785,22786,22787 (ISS) |
|