VID |
22399 |
Severity |
30 |
Port |
8080, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
A version of Dwarf HTTP Server before version 1.3.3 has been installed on the host. Dwarf HTTP Server is, a full-featured, Java-based web server. Dwarf HTTP Server version 1.3.2 and possibly earlier versions are vulnerable to multiple vulnerabilities, which can be exploited by a remote attacker to disclose potentially sensitive information and to conduct cross-site scripting attacks.
1) Source Disclosure Vulnerability: By sending a file with a specially-crafted filename extension containing dot, space, slash and NULL characters, a remote attacker could view the source code of JSP files. 2) Cross-Site Scripting: Input passed to the URL is not sanitized before being return to the user in an error message. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
* Note: This check solely relied on the banner of the remote HTTP server to assess this vulnerability, so this might be a false positive.
* References: http://secunia.com/secunia_research/2006-13/advisory/ http://secunia.com/advisories/18962/
* Platforms Affected: GNOME, Dwarf HTTP Server versions prior to 1.3.2 Linux Any version |
Recommendation |
Upgrade to the latest version of Dwarf HTTP Server (1.3.3 or later), available from the Dwarf HTTP Server Web site at http://www.gnome.sk/Dwarf/dwarf_http.html |
Related URL |
CVE-2006-0819,CVE-2006-0820 (CVE) |
Related URL |
17123 (SecurityFocus) |
Related URL |
25178,25179 (ISS) |
|