![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.800811 |
Category: | Web application abuses |
Title: | Sun Java System Web Proxy Server Vulnerabilities - Windows |
Summary: | Sun Java Web Server is prone to a cross-site scripting (XSS) vulnerability. |
Description: | Summary: Sun Java Web Server is prone to a cross-site scripting (XSS) vulnerability. Vulnerability Insight: The Flaw is due to: error in 'Reverse Proxy Plug-in' which is not properly sanitized the input data before being returned to the user. This can be exploited to inject arbitrary web script or HTML via the query string in situations that result in a 502 Gateway error. Vulnerability Impact: Successful exploitation will lets the attackers to execute arbitrary code, gain sensitive information by conducting XSS attacks in the context of an affected site. Affected Software/OS: Sun Java System Web Server versions 6.1 and before 6.1 SP11 on Windows. Solution: Update to Web Server version 6.1 SP11. CVSS Score: 4.3 CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2009-1934 BugTraq ID: 35204 http://www.securityfocus.com/bid/35204 http://osvdb.org/54872 http://www.securitytracker.com/id?1022334 http://secunia.com/advisories/35338 http://sunsolve.sun.com/search/document.do?assetkey=1-66-259588-1 http://www.vupen.com/english/advisories/2009/1500 XForce ISS Database: jsws-reverseproxyplugin-xss(50951) https://exchange.xforce.ibmcloud.com/vulnerabilities/50951 |
Copyright | Copyright (C) 2009 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |