Oracle Sun GlassFish Enterprise Server – Persistent Cross-Site Scripting

  • 作者: Sense of Security
    日期: 2011-07-20
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/17551/
  • Sense of Security - Security Advisory - SOS-11-009
    
    Release Date.19-Jul-2011
    Last Update. -
    Vendor Notification Date.23-Mar-2011
    Product. Oracle Sun GlassFish Enterprise
     Server
    Platform.Java EE
    Affected versions. 2.1.1 ((v2.1 Patch06)(9.1_02 Patch12))
     (build b31g-fcs) verified and possibly
     others
    Severity Rating. Medium
    Impact.Cookie/credential theft, impersonation,
     loss of confidentiality, client-side
     code execution
    Attack Vector. Remote without authentication
    Solution Status. Vendor patch
    CVE reference. CVE-2011-2260
    Oracle Bug ID. 7030596
    
    Details.
    GlassFish is an open source application server project led by Sun
    Microsystems for the Java EE platform. The proprietary version is
    called Sun GlassFish Enterprise Server. GlassFish supports all Java EE
    API specifications, such as JDBC, RMI, e-mail, JMS, web services, XML,
    etc, and defines how to coordinate them.
    
    Stored:
    The log viewer fails to securely output encode logged values. As a
    result, an unauthenticated attacker can trigger the application to log
    a malicious string by entering the values into the username field. This
    will cause the application to log the incorrect login attempt and
    results in a stored XSS vulnerability. When an administrator logs into
    the application and views the log, the malicious code will be executed
    in the client browser. As an example, navigate to:
    http://[host]:4848
    
    Enter the below into the login field:
    '>\"><script>alert(3);</script>
    When the user views the \"Search Log Files\" page, the above client-side
    code will be executed in the client browser. The offending script is
    http://[host]:4848/logViewer/logViewer.jsf
    
    Reflected:
    By modifying the windowTitle or helpFile variables of
    /com_sun_webui_jsf/help/helpwindow.jsf it is possible to trigger a
    reflected XSS vulnerability. An example is shown below:
    /com_sun_webui_jsf/help/helpwindow.jsf?&windowTitle=Help+Window'>\">
    <script>alert(1);</script>&helpFile=commontask.html
    /com_sun_webui_jsf/help/helpwindow.jsf?&windowTitle=Help+Window&
    helpFile=commontask.html'>\"><script>alert(1);</script>
    
    Solution.
    Apply the vendor patch.
    
    Discovered by.
    Sense of Security Labs.
    
    About us.
    Sense of Security is a leading provider of information
    security and risk management solutions. Our team has expert
    skills in assessment and assurance, strategy and architecture,
    and deployment through to ongoing management. We are
    Australia's premier application penetration testing firm and
    trusted IT security advisor to many of the country's largest
    organisations.
    
    Sense of Security Pty Ltd
    Level 8, 66 King St
    Sydney NSW 2000
    AUSTRALIA
    
    T: +61 (0)2 9290 4444
    F: +61 (0)2 9290 4455
    W: http://www.senseofsecurity.com.au/consulting/penetration-testing
    E: info@senseofsecurity.com.au
    Twitter: @ITsecurityAU
    
    The latest version of this advisory can be found at:
    http://www.senseofsecurity.com.au/advisories/SOS-11-009.pdf