Korean
<< Back
VID 22379
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Xerver web server is vulnerable to multiple vulnerabilities. Xerver is a freely available Java-based Web server developed by Omid Rouhani. Xerver version 4.17 and possibly other versions are vulnerable to multiple vulnerabilities, which can be exploited by a remote attacker to conduct cross-site scripting attacks, and disclose system and sensitive information.

1) The problem is that it is possible to disclose the source code of script files by appending a dot to the filename in a HTTP request.
2) The problem is that the content of a directory can be disclosed even when there is an index file by appending a null character (%00) to the path in a HTTP request.
3) By creating a specially crafted URL containing a null character (%00) followed by malicious code, an attacker can perform cross-site scripting attacks. This can further be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

* References:
http://www.osvdb.org/20075
http://www.osvdb.org/20076
http://www.osvdb.org/20077
http://secunia.com/advisories/17243/

* Platforms Affected:
Omid Rouhani, Xerver version 4.17 and possibly other versions
Any operating system Any version
Recommendation Upgrade to the latest version of Xerver (4.20 or later), available from the Xerver Web page at http://www.javascript.nu/xerver/
Related URL CVE-2005-3293 (CVE)
Related URL 15135 (SecurityFocus)
Related URL 22785,22786,22787 (ISS)