Secunia Advisory: SA28186  
Release Date: 2007-12-21

Critical:
Less critical
Impact: Cross Site Scripting
Where: From remote
Solution Status: Vendor Patch

Software:Sun Java System Web Proxy Server 3.x
Sun Java System Web Proxy Server 4.x

  Want to know the next time vulnerabilities are fixed in this product?
- Companies can be alerted via email and SMS!

Description:
Some vulnerabilities have been reported in Sun Java System Web Proxy Server, which can be exploited by malicious people to conduct cross-site scripting attacks.

1) Input passed via unspecified parameters within the View Error Log functionality is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

The vulnerability is reported in 4.x versions prior to 4.0.6.

2) Input passed via unspecified parameters within the View URL Database functionality is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

The vulnerability is reported in 4.x versions prior to 4.0.6 and 3.x versions prior to 3.6 SP11.

Solution:
Sun Java System Web Proxy Server 4.x:
Update to version 4.0.6.
http://www.sun.com/download/products.xml?id=4701e042

Sun Java System Web Proxy Server 3.x:
Update to version 3.6 Service Pack 11.
http://www.sun.com/download/products.xml?id=472a622f

Provided and/or discovered by:
Reported by the vendor.

Original Advisory:
http://docs.sun.com/source/820-3637-10/relnotes36sp11_unix.html#wp19247
http://docs.sun.com/app/docs/doc/820-2499/aeaaa?a=view


資料來源 http://secunia.com/advisories/28186/
arrow
arrow
    全站熱搜
    創作者介紹
    創作者 ivan0914 的頭像
    ivan0914

    I'n Blog 之萬象真藏

    ivan0914 發表在 痞客邦 留言(0) 人氣()