Secunia Advisory: | SA28186 | |
Release Date: | 2007-12-21 | |
Critical: | Less critical | |
Impact: | Cross Site Scripting | |
Where: | From remote | |
Solution Status: | Vendor Patch | |
Software: | Sun Java System Web Proxy Server 3.x Sun Java System Web Proxy Server 4.x | |
Want to know the next time vulnerabilities are fixed in this product? - Companies can be alerted via email and SMS! | ||
Some vulnerabilities have been reported in Sun Java System Web Proxy Server, which can be exploited by malicious people to conduct cross-site scripting attacks.
1) Input passed via unspecified parameters within the View Error Log functionality is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
The vulnerability is reported in 4.x versions prior to 4.0.6.
2) Input passed via unspecified parameters within the View URL Database functionality is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
The vulnerability is reported in 4.x versions prior to 4.0.6 and 3.x versions prior to 3.6 SP11.
Solution:
Sun Java System Web Proxy Server 4.x:
Update to version 4.0.6.
http://www.sun.com/download/products.xml?id=4701e042
Sun Java System Web Proxy Server 3.x:
Update to version 3.6 Service Pack 11.
http://www.sun.com/download/products.xml?id=472a622f
Provided and/or discovered by:
Reported by the vendor.
Original Advisory:
http://docs.sun.com/source/820-3637-10/relnotes36sp11_unix.html#wp19247
http://docs.sun.com/app/docs/doc/820-2499/aeaaa?a=view
資料來源 http://secunia.com/advisories/28186/
全站熱搜
留言列表