发布时间 :2003-12-31 00:00:00
修订时间 :2008-09-05 16:37:08

[原文]Multiple cross-site scripting (XSS) vulnerabilities in example scripts in Caucho Technology Resin 2.0 through 2.1.2 allow remote attackers to inject arbitrary web script or HTML via (1) env.jsp, (2) form.jsp, (3) session.jsp, (4) the move parameter to tictactoe.jsp, or the (5) name or (6) comment fields to guestbook.jsp.

[CNNVD]Caucho Resin多个HTML注入和跨站脚本漏洞(CNNVD-200312-357)

        Caucho Technology Resin 2.0版本到2.1.2版本的示例脚本存在多个跨站脚本(XSS)漏洞。远程攻击者可以借助(1)env.jsp、(2)form.jsp、(3)session.jsp、(4)tictactoe.jsp的move参数或者guestbook.jsp的(5)名称或(6)注释栏来注入任意web脚本或HTML。

- CVSS (基础分值)

CVSS分值: 4.3 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: MEDIUM [漏洞利用存在一定的访问条件]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-79 [在Web页面生成时对输入的转义处理不恰当(跨站脚本)]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(VENDOR_ADVISORY)  XF  resin-name-comment-xss(13460)
(UNKNOWN)  BID  8852
(UNKNOWN)  FULLDISC  20031019 Caucho Resin 2.x - Cross Site Scripting

- 漏洞信息

Caucho Resin多个HTML注入和跨站脚本漏洞
中危 跨站脚本
2003-12-31 00:00:00 2003-12-31 00:00:00
        Caucho Technology Resin 2.0版本到2.1.2版本的示例脚本存在多个跨站脚本(XSS)漏洞。远程攻击者可以借助(1)env.jsp、(2)form.jsp、(3)session.jsp、(4)tictactoe.jsp的move参数或者guestbook.jsp的(5)名称或(6)注释栏来注入任意web脚本或HTML。

- 公告与补丁

        It has been reported that this problem does not affect Caucho Resin version 3.0 and above. Users are advised to update their software from the vendor.

- 漏洞信息 (23262)

Caucho Resin 2.0/2.1 Multiple HTML Injection and Cross-site Scripting Vulnerabilities (EDBID:23262)
jsp webapps
2003-10-20 Verified
0 Donnie Werner
N/A [点击下载]

It has been reported that Caucho Resin is prone to multiple HTML Injection and cross-site scripting vulnerabilities in various scripts that may allow a remote attacker to cause hostile HTML or script code to be rendered in the browser of a user who follows a malicious link supplied by the attacker.

The affected scripts include env.jsp, form.jsp, session.jsp, and tictactoe.jsp. The 'name' and 'comment' fields of guestbook.jsp have been reported to be vulnerable to HTML injection. An attacker may exploit this vulnerability to execute arbitrary HTML and script code in the browser of an unsuspecting user. Exploitation may also allow attackers to inject hostile HTML and script code into the sample guestbook.

Successful exploitation of these issues may allow an attacker to steal cookie-based credentials. Other attacks may also be possible.

Caucho Resin version 2.1 and prior have been reported to be prone to this issue, however other versions may be affected as well.<iframe%20src="http://attcker/evil.cgi"></iframe>4

- 漏洞信息

Caucho Resin form.jsp XSS
Remote / Network Access Input Manipulation
Loss of Integrity

- 漏洞描述

Resin sample scripts contain a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate user input upon submission to the form.jsp script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

- 时间线

2003-10-20 2003-10-20
Unknow Unknow

- 解决方案

Upgrade to version 3.0 or higher, as it has been reported to fix this vulnerability. It is also possible to correct the flaw by implementing the following workaround(s): remove the form.jsp script if it is not needed

- 相关参考

- 漏洞作者