Apache Struts struts-cookbook processSimple.do message Parameter XSS

This script is Copyright (C) 2012-2013 Tenable Network Security, Inc.


Synopsis :

A remote web application is vulnerable to a cross-site scripting
attack.

Description :

The remote web server hosts struts-cookbook, a demonstration
application for the Struts framework. Input passed via the 'message'
parameter to the 'processSimple.do' page is not properly sanitized
before using it to generate dynamic HTML.

By tricking someone into clicking on a specially crafted link, an
attacker may be able exploit this to inject arbitrary HTML and script
code into a user's browser to be executed within the security context
of the affected site.

See also :

http://secpod.org/blog/?p=450
http://www.nessus.org/u?d16eaf1b

Solution :

Remove or restrict access to the Struts-cookbook application.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 4.1
(CVSS2#E:F/RL:U/RC:ND)
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 60093 ()

Bugtraq ID: 51900

CVE ID: CVE-2012-1007