Sun Java System Calendar Server login.wcap Fmt-out Parameter XSS

This script is Copyright (C) 2009-2013 Tenable Network Security, Inc.


Synopsis :

The remote web server uses a script that is affected by a cross-site
scripting vulnerability.

Description :

The version of Sun Java System Calendar Server running on the
remote host fails to sanitize input to the 'Fmt-out' parameter of the
'login.wcap' script before using it to generate dynamic HTML output.

An attacker may be able to leverage this to inject arbitrary HTML and
script code into a user's browser to be executed within the security
context of the affected site.

Note that this install is also likely to be affected by other
vulnerabilities, although Nessus has not checked for them.

See also :

http://www.coresecurity.com/content/sun-calendar-express
http://www.securityfocus.com/archive/1/502320/30/0/threaded
http://download.oracle.com/sunalerts/1020321.1.html

Solution :

Apply the appropriate patch referenced in the vendor advisory above.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.6
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 38913 ()

Bugtraq ID: 34152

CVE ID: CVE-2009-1218