![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.800811 |
Categoría: | Web application abuses |
Título: | Sun Java System Web Proxy Server Vulnerabilities - Windows |
Resumen: | Sun Java Web Server is prone to a cross-site scripting (XSS) vulnerability. |
Descripción: | Summary: Sun Java Web Server is prone to a cross-site scripting (XSS) vulnerability. Vulnerability Insight: The Flaw is due to: error in 'Reverse Proxy Plug-in' which is not properly sanitized the input data before being returned to the user. This can be exploited to inject arbitrary web script or HTML via the query string in situations that result in a 502 Gateway error. Vulnerability Impact: Successful exploitation will lets the attackers to execute arbitrary code, gain sensitive information by conducting XSS attacks in the context of an affected site. Affected Software/OS: Sun Java System Web Server versions 6.1 and before 6.1 SP11 on Windows. Solution: Update to Web Server version 6.1 SP11. CVSS Score: 4.3 CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2009-1934 BugTraq ID: 35204 http://www.securityfocus.com/bid/35204 http://osvdb.org/54872 http://www.securitytracker.com/id?1022334 http://secunia.com/advisories/35338 http://sunsolve.sun.com/search/document.do?assetkey=1-66-259588-1 http://www.vupen.com/english/advisories/2009/1500 XForce ISS Database: jsws-reverseproxyplugin-xss(50951) https://exchange.xforce.ibmcloud.com/vulnerabilities/50951 |
Copyright | Copyright (C) 2009 Greenbone AG |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |