Korean
<< Back
VID 22399
Severity 30
Port 8080, ...
Protocol TCP
Class CGI
Detailed Description A version of Dwarf HTTP Server before version 1.3.3 has been installed on the host. Dwarf HTTP Server is, a full-featured, Java-based web server. Dwarf HTTP Server version 1.3.2 and possibly earlier versions are vulnerable to multiple vulnerabilities, which can be exploited by a remote attacker to disclose potentially sensitive information and to conduct cross-site scripting attacks.

1) Source Disclosure Vulnerability: By sending a file with a specially-crafted filename extension containing dot, space, slash and NULL characters, a remote attacker could view the source code of JSP files.
2) Cross-Site Scripting: Input passed to the URL is not sanitized before being return to the user in an error message. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

* Note: This check solely relied on the banner of the remote HTTP server to assess this vulnerability, so this might be a false positive.

* References:
http://secunia.com/secunia_research/2006-13/advisory/
http://secunia.com/advisories/18962/

* Platforms Affected:
GNOME, Dwarf HTTP Server versions prior to 1.3.2
Linux Any version
Recommendation Upgrade to the latest version of Dwarf HTTP Server (1.3.3 or later), available from the Dwarf HTTP Server Web site at http://www.gnome.sk/Dwarf/dwarf_http.html
Related URL CVE-2006-0819,CVE-2006-0820 (CVE)
Related URL 17123 (SecurityFocus)
Related URL 25178,25179 (ISS)