Apache Struts struts-examples upload-submit.do theText Parameter XSS

This script is Copyright (C) 2012-2013 Tenable Network Security, Inc.


Synopsis :

A remote web application is vulnerable to a cross-site scripting
attack.

Description :

The remote web server hosts struts-examples, a demonstration
application for the Struts framework. Input passed via the 'theText'
POST parameter to the 'upload-submit.do' page is not properly
sanitized before using it to generate dynamic HTML.

By tricking someone into clicking on a specially crafted link, an
attacker may be able exploit this to inject arbitrary HTML and script
code into a user's browser to be executed within the security context
of the affected site.

See also :

http://secpod.org/blog/?p=450
http://www.nessus.org/u?d16eaf1b

Solution :

Remove or restrict access to the Struts-examples application.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 4.1
(CVSS2#E:F/RL:U/RC:ND)
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 60094 ()

Bugtraq ID: 51900

CVE ID: CVE-2012-1007