Vulnerability Note VU#262352

Sun Secure Global Desktop Software (SSGD) contains multiple cross-site scripting vulnerabilities

Original Release date: 13 Dec 2006 | Last revised: 20 Dec 2006

Overview

The Sun Secure Global Desktop (SSGD) contains cross-site scripting vulnerabilities.

Description

Sun Secure Global Desktop (formerly Tarantella) contains multiple input validation vulnerabilities due to failure to properly sanitize user input. The following modules do not properly filter HTML code from user input, facilitating cross-site scripting attacks:

  • taarchives.cgi
  • ttaAuthentication.jsp
  • ttalicense.cgi
  • ttawlogin.cgi
  • ttawebtop.cgi
  • ttaabout.cgi
  • test-cgi
    Sun states that this issue affects Sun Secure Global Desktop Software 4.2 prior to build 4.20.983 for Solaris 8 and 9 on the SPARC platform, Solaris 10 on the SPARC and x86 platforms, and the Linux platform.

    Impact

    A remote attacker may be able to execute arbitrary script commands in the context of a victim user. Secondary impacts include: theft of cookie information, session hijacking, and loss of data privacy between a client and the intended server.

    Solution

    Apply an update

    Sun has addressed this vulnerability in the latest build of Sun Secure Global Desktop.

    Systems Affected (Learn More)

    VendorStatusDate NotifiedDate Updated
    Sun Microsystems, Inc.Affected-31 Oct 2006
    If you are a vendor and your product is affected, let us know.

    CVSS Metrics (Learn More)

    Group Score Vector
    Base N/A N/A
    Temporal N/A N/A
    Environmental N/A N/A

    References

    Credit

    This issue was reported by SUN in document 102650. Sun thanks Marc Ruef of scip AG for reporting this issue.

    This document was written by Katie Steiner.

    Other Information

    • CVE IDs: CVE-2006-4958
    • Date Public: 21 Sep 2006
    • Date First Published: 13 Dec 2006
    • Date Last Updated: 20 Dec 2006
    • Severity Metric: 13.50
    • Document Revision: 14

    Feedback

    If you have feedback, comments, or additional information about this vulnerability, please send us email.