Multiple cross-site scripting (XSS) vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 allow remote attackers to inject arbitrary web script or HTML via the (1) name, (2) ip, (3) username, or (4) description parameter to console/portal/Server/Monitoring; or (5) the PATH_INFO to the default URI under console/portal/.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://geronimo.apache.org/21x-security-report.html#2.1.xSecurityReport-214 | patch vendor advisory |
http://www.vupen.com/english/advisories/2009/1089 | vdb entry |
http://www.securityfocus.com/bid/34562 | vdb entry exploit |
http://www.securityfocus.com/archive/1/502734/100/0/threaded | mailing list |
http://issues.apache.org/jira/browse/GERONIMO-4597 | patch |
http://secunia.com/advisories/34715 | third party advisory |
http://dsecrg.com/pages/vul/show.php?id=119 | exploit |