what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Oracle Sun GlassFish Enterprise Server 2.1.1 Cross Site Scripting

Oracle Sun GlassFish Enterprise Server 2.1.1 Cross Site Scripting
Posted Jul 20, 2011
Site senseofsecurity.com.au

Oracle Sun GlassFish Enterprise Server version 2.1.1 suffers from a cross site scripting vulnerability. Proof of concept code included.

tags | exploit, xss, proof of concept
advisories | CVE-2011-2260
SHA-256 | e852d78319b40a191a8aa9ea6c5cefd12cf9f11cf487cae2ce22d9f26df1275b

Oracle Sun GlassFish Enterprise Server 2.1.1 Cross Site Scripting

Change Mirror Download
Sense of Security - Security Advisory - SOS-11-009

Release Date. 19-Jul-2011
Last Update. -
Vendor Notification Date. 23-Mar-2011
Product. Oracle Sun GlassFish Enterprise
Server
Platform. Java EE
Affected versions. 2.1.1 ((v2.1 Patch06)(9.1_02 Patch12))
(build b31g-fcs) verified and possibly
others
Severity Rating. Medium
Impact. Cookie/credential theft, impersonation,
loss of confidentiality, client-side
code execution
Attack Vector. Remote without authentication
Solution Status. Vendor patch
CVE reference. CVE-2011-2260
Oracle Bug ID. 7030596

Details.
GlassFish is an open source application server project led by Sun
Microsystems for the Java EE platform. The proprietary version is
called Sun GlassFish Enterprise Server. GlassFish supports all Java EE
API specifications, such as JDBC, RMI, e-mail, JMS, web services, XML,
etc, and defines how to coordinate them.

Stored:
The log viewer fails to securely output encode logged values. As a
result, an unauthenticated attacker can trigger the application to log
a malicious string by entering the values into the username field. This
will cause the application to log the incorrect login attempt and
results in a stored XSS vulnerability. When an administrator logs into
the application and views the log, the malicious code will be executed
in the client browser. As an example, navigate to:
http://[host]:4848

Enter the below into the login field:
'>\"><script>alert(3);</script>
When the user views the \"Search Log Files\" page, the above client-side
code will be executed in the client browser. The offending script is
http://[host]:4848/logViewer/logViewer.jsf

Reflected:
By modifying the windowTitle or helpFile variables of
/com_sun_webui_jsf/help/helpwindow.jsf it is possible to trigger a
reflected XSS vulnerability. An example is shown below:
/com_sun_webui_jsf/help/helpwindow.jsf?&windowTitle=Help+Window'>\">
<script>alert(1);</script>&helpFile=commontask.html
/com_sun_webui_jsf/help/helpwindow.jsf?&windowTitle=Help+Window&
helpFile=commontask.html'>\"><script>alert(1);</script>

Solution.
Apply the vendor patch.

Discovered by.
Sense of Security Labs.

About us.
Sense of Security is a leading provider of information
security and risk management solutions. Our team has expert
skills in assessment and assurance, strategy and architecture,
and deployment through to ongoing management. We are
Australia's premier application penetration testing firm and
trusted IT security advisor to many of the country's largest
organisations.

Sense of Security Pty Ltd
Level 8, 66 King St
Sydney NSW 2000
AUSTRALIA

T: +61 (0)2 9290 4444
F: +61 (0)2 9290 4455
W: http://www.senseofsecurity.com.au
E: info@senseofsecurity.com.au
Twitter: @ITsecurityAU

The latest version of this advisory can be found at:
http://www.senseofsecurity.com.au/advisories/SOS-11-009.pdf
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close