Giorgius
24-09-2004, 14.25.05
Multiple vulnerabilities have been reported in JRun Server, which can be exploited by malicious people to hijack an authenticated user's session, conduct cross-site scripting attacks, disclose sensitive information, and cause a DoS (Denial of Service).
1) An implementation error in the generation and handling of JSESSIONIDs can be exploited to hijack an authenticated user's session.
2) A cross-site scripting and session handling vulnerability in the JRun Management Console can be exploited to execute arbitrary HTML and script code in a user's browser session in context of a vulnerable site, or hijack an authenticated user's session.
3) An URL parsing error can e.g. be exploited to show the source of any file such as script files inside the web root by appending ";.cfm" to the end of an URL.
NOTE: This vulnerability only affects the Microsoft IIS connector.
4) A boundary error in the verbose logging module can be exploited to cause the web server to crash.
Successful exploitation requires that "verbose" debug mode is enabled for the JRun web server connectors (not enabled by default).
The vulnerabilities have been reported in versions 3.0, 3.1, and 4.0.
Leggi:
http://secunia.com/advisories/12638/
1) An implementation error in the generation and handling of JSESSIONIDs can be exploited to hijack an authenticated user's session.
2) A cross-site scripting and session handling vulnerability in the JRun Management Console can be exploited to execute arbitrary HTML and script code in a user's browser session in context of a vulnerable site, or hijack an authenticated user's session.
3) An URL parsing error can e.g. be exploited to show the source of any file such as script files inside the web root by appending ";.cfm" to the end of an URL.
NOTE: This vulnerability only affects the Microsoft IIS connector.
4) A boundary error in the verbose logging module can be exploited to cause the web server to crash.
Successful exploitation requires that "verbose" debug mode is enabled for the JRun web server connectors (not enabled by default).
The vulnerabilities have been reported in versions 3.0, 3.1, and 4.0.
Leggi:
http://secunia.com/advisories/12638/