Resin viewfile Servlet file Parameter XSS

This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.

Synopsis :

The remote web server contains a Java Servlet that is affected by a
cross-site scripting vulnerability.

Description :

The remote host is running Resin, an application server.

The 'viewfile' Servlet included with the version of Resin installed on
the remote host fails to sanitize user input to the 'file' parameter
before including it in dynamic HTML output. An attacker may be able
to leverage this issue to inject arbitrary HTML and script code into a
user's browser to be executed within the security context of the
affected site.

Note that the affected Servlet is part of the Resin documentation,
which should not be installed on production servers.

See also :

Solution :

Upgrade to Resin or Resin Pro version 3.1.4 / 3.0.25 or later.

Risk factor :

Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.7
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 33273 ()

Bugtraq ID: 29948

CVE ID: CVE-2008-2462

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now