Apache Jackrabbit 多个跨站脚本漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1117266 漏洞类型 跨站脚本
发布时间 2009-01-20 更新时间 2009-01-20
CVE编号 CVE-2009-0026 CNNVD-ID CNNVD-200901-265
漏洞平台 JSP CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/32742
https://www.securityfocus.com/bid/33360
https://cxsecurity.com/issue/WLB-2009010191
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200901-265
|漏洞详情
ApacheJackrabbit是一个完全遵守JavaAPI版的内容存储规范(JCR)的实现。ApacheJackrabbit的search.jsp和swr.jsp页面没有正确地过滤q参数便返回给了用户,这允许远程攻击者通过提交恶意请求执行跨站脚本攻击,在用户浏览器会话中执行任意HTML和脚本代码。
|漏洞EXP
source: http://www.securityfocus.com/bid/33360/info
 
Apache Jackrabbit is prone to multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data.
 
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
 
Versions prior to Apache Jackrabbit 1.5.2 are vulnerable. 

http://www.example.com/swr.jsp?q=%25"<script>alert(1)</script>&swrnum=1
|受影响的产品
Apache Apache Jackrabbit 1.5 Apache Apache Jackrabbit 1.4
|参考资料

来源:CONFIRM
名称:https://issues.apache.org/jira/browse/JCR-1925
链接:https://issues.apache.org/jira/browse/JCR-1925
来源:XF
名称:jackrabbit-search-swr-xss(48110)
链接:http://xforce.iss.net/xforce/xfdb/48110
来源:BID
名称:33360
链接:http://www.securityfocus.com/bid/33360
来源:BUGTRAQ
名称:20090120[ANNOUNCE]ApacheJackrabbit1.5.2released
链接:http://www.securityfocus.com/archive/1/archive/1/500196/100/0/threaded
来源:VUPEN
名称:ADV-2009-0177
链接:http://www.frsirt.com/english/advisories/2009/0177
来源:www.apache.org
链接:http://www.apache.org/dist/jackrabbit/RELEASE-NOTES-1.5.2.txt
来源:SREASON
名称:4942
链接:http://securityreason.com/securityalert/4942
来源:SECUNIA
名称:33576
链接:http://secunia.com/advisories/33576