Vulnerability Note VU#245081

Accoria Rock Web Server contains multiple vulnerabilities

Original Release date: 01 Jun 2010 | Last revised: 22 Jun 2010


Accoria Web Server contains multiple vulnerabilities that collectively could allow an attacker to execute commands through the administration interface.


The Accoria web server, also known as Rock Web Server, contains several cross-site scripting (XSS) and cross-site request forgery (XSRF) vulnerabilities. Directory traversal and format string vulnerabilities exist as well. The getenv sample code contains an XSS vulnerability when viewed by Internet Explorer 6 or other web browsers that do not follow RFC 2616 Section 7.2.1. Generated cookies appear to be weak and predictable, which may allow an attacker to bypass authentication.

Further details are available from the IOActive security advisory.


A remote and unauthenticated attacker may be able to execute commands in the context of the web server administrator.


Apply an update
The vendor recommends all users upgrade to version 1.5.2 or later.

Restrict access

Appropriate firewall rules should be set up to limit access to the web server's administration interface to only trusted sources.

XSRF protection

To avoid XSRF attacks, do not click on links from untrusted sources while logged into the administration interface.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
Accoria NetworksAffected-22 Jun 2010
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Thank you to Ilja van Sprundel of IOActive for researching and reporting these vulnerabilities.

This document was written by Jared Allar.

Other Information

  • CVE IDs: Unknown
  • Date Public: 19 May 2010
  • Date First Published: 01 Jun 2010
  • Date Last Updated: 22 Jun 2010
  • Severity Metric: 3.10
  • Document Revision: 24


If you have feedback, comments, or additional information about this vulnerability, please send us email.