Sun Java System Calendar Server login.wcap Fmt-out Parameter XSS

This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.


Synopsis :

The remote web server uses a script that is affected by a cross-site
scripting vulnerability.

Description :

The version of Sun Java System Calendar Server running on the
remote host fails to sanitize input to the 'Fmt-out' parameter of the
'login.wcap' script before using it to generate dynamic HTML output.

An attacker may be able to leverage this to inject arbitrary HTML and
script code into a user's browser to be executed within the security
context of the affected site.

Note that this install is also likely to be affected by other
vulnerabilities, although Nessus has not checked for them.

See also :

http://www.coresecurity.com/content/sun-calendar-express
http://www.securityfocus.com/archive/1/502320/30/0/threaded
http://download.oracle.com/sunalerts/1020321.1.html

Solution :

Apply the appropriate patch referenced in the vendor advisory above.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 38913 ()

Bugtraq ID: 34152

CVE ID: CVE-2009-1218

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial