A cross-site scripting vulnerability exists in the Macromedia JRun Server Management Console that may allow an attacker to execute arbitrary code.
JRun is an application server that works with most popular web servers such as Apache and IIS. Macromedia states that JRun is deployed at over 10,000 organizations worldwide. The JRun Management Console (JMC) is a web-based utility used to manage and configure the JRun Server. There are reports of a cross-site scripting vulnerability in the JMC. According these reports, the JMC fails to filter variables encoded in a URL for malicious content. As a result, a remote attacker may be able to insert and execute arbitrary code within the security context of the JMC site. According to Macromedia only JRun version 4.0 is vulnerable.
A remote attacker may be able to execute arbitrary code within the security context of the JMC site. If the site is compromised, an attacker may be able to access a user's cookies allowing them to view sensitive information or hijack an authenticated user's session.
This vulnerability was reported in Macromedia Security Bulletin MPSB04-08.Macromedia credits Acros for helping to discover and report this issue.
This document was written by Jeff Gennari.
|Date First Published:||2004-10-12|
|Date Last Updated:||2004-10-12 16:52 UTC|