Summary
The remote web server seems to be vulnerable to a Cross Site Scripting vulnerability (XSS). The vulnerability is caused by the result being returned to the user when a non-existing file is requested (e.g. the result contains script code provided in the request).
This vulnerability would allow an attacker to make the server present the user with the attacker's JavaScript/HTML code.
Since the content is presented by the server, the user will give it the trust level of the server (for example, the websites banks, shopping centers, etc. would usually be trusted by a user).
Solutions:
. Allaire/Macromedia Jrun:
- http://www.macromedia.com/software/jrun/download/update/ [^] - http://www.securiteam.com/windowsntfocus/Allaire_fixes_Cross-Site_Scripting_security_vulnerability.html [^] . Microsoft IIS:
- http://www.securiteam.com/windowsntfocus/IIS_Cross-Site_scripting_vulnerability__Patch_available_.html [^] . Apache:
- http://httpd.apache.org/info/css-security/ [^]
. Bluecoat CacheOS:
- http://download.cacheflow.com/release/CA/4.1.00-docs/CACacheOS41fixes.htm [^] . ColdFusion:
- http://www.macromedia.com/v1/handlers/index.cfm?ID=23047 [^] . General:
- http://www.securiteam.com/exploits/Security_concerns_when_developing_a_dynamically_generated_web_site.html [^] - http://www.cert.org/advisories/CA-2000-02.html [^]
Severity
Classification
-
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:N/I:P/A:N
Related Vulnerabilities
- F*EX (Frams's Fast File EXchange) Multiple XSS Vulnerabilities
- IBM Rational Quality Manager and Rational Test Lab Manager Tomcat Default Account Vulnerability
- IIS Service Pack - 404
- HTTP File Server Security Bypass and Denial of Service Vulnerabilities
- CA ARCserver D2D GWT RPC Request Multiple Vulnerabilities