Web Server Cross Site Scripting

Summary
The remote web server seems to be vulnerable to a Cross Site Scripting vulnerability (XSS). The vulnerability is caused by the result being returned to the user when a non-existing file is requested (e.g. the result contains script code provided in the request). This vulnerability would allow an attacker to make the server present the user with the attacker's JavaScript/HTML code. Since the content is presented by the server, the user will give it the trust level of the server (for example, the websites banks, shopping centers, etc. would usually be trusted by a user). Solutions: . Allaire/Macromedia Jrun: - http://www.macromedia.com/software/jrun/download/update/ [^] - http://www.securiteam.com/windowsntfocus/Allaire_fixes_Cross-Site_Scripting_security_vulnerability.html [^] . Microsoft IIS: - http://www.securiteam.com/windowsntfocus/IIS_Cross-Site_scripting_vulnerability__Patch_available_.html [^] . Apache: - http://httpd.apache.org/info/css-security/ [^] . Bluecoat CacheOS: - http://download.cacheflow.com/release/CA/4.1.00-docs/CACacheOS41fixes.htm [^] . ColdFusion: - http://www.macromedia.com/v1/handlers/index.cfm?ID=23047 [^] . General: - http://www.securiteam.com/exploits/Security_concerns_when_developing_a_dynamically_generated_web_site.html [^] - http://www.cert.org/advisories/CA-2000-02.html [^]