Vulnerability Note VU#668206

Macromedia JRun Server is vulnerable to a cross-site scripting attack

Original Release date: 12 Oct 2004 | Last revised: 12 Oct 2004

Overview

A cross-site scripting vulnerability exists in the Macromedia JRun Server Management Console that may allow an attacker to execute arbitrary code.

Description

JRun is an application server that works with most popular web servers such as Apache and IIS. Macromedia states that JRun is deployed at over 10,000 organizations worldwide. The JRun Management Console (JMC) is a web-based utility used to manage and configure the JRun Server. There are reports of a cross-site scripting vulnerability in the JMC. According these reports, the JMC fails to filter variables encoded in a URL for malicious content. As a result, a remote attacker may be able to insert and execute arbitrary code within the security context of the JMC site. According to Macromedia only JRun version 4.0 is vulnerable.

Impact

A remote attacker may be able to execute arbitrary code within the security context of the JMC site. If the site is compromised, an attacker may be able to access a user's cookies allowing them to view sensitive information or hijack an authenticated user's session.

Solution

Apply Patch

Apply the latest JRun updater:

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Macromedia Inc.Affected29 Sep 200404 Oct 2004
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

This vulnerability was reported in Macromedia Security Bulletin MPSB04-08.

Macromedia credits Acros for helping to discover and report this issue.

This document was written by Jeff Gennari.

Other Information

  • CVE IDs: Unknown
  • Date Public: 23 Sep 2004
  • Date First Published: 12 Oct 2004
  • Date Last Updated: 12 Oct 2004
  • Severity Metric: 5.76
  • Document Revision: 97

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.