Vulnerability Note VU#668206
Macromedia JRun Server is vulnerable to a cross-site scripting attack
A cross-site scripting vulnerability exists in the Macromedia JRun Server Management Console that may allow an attacker to execute arbitrary code.
JRun is an application server that works with most popular web servers such as Apache and IIS. Macromedia states that JRun is deployed at over 10,000 organizations worldwide. The JRun Management Console (JMC) is a web-based utility used to manage and configure the JRun Server. There are reports of a cross-site scripting vulnerability in the JMC. According these reports, the JMC fails to filter variables encoded in a URL for malicious content. As a result, a remote attacker may be able to insert and execute arbitrary code within the security context of the JMC site. According to Macromedia only JRun version 4.0 is vulnerable.
A remote attacker may be able to execute arbitrary code within the security context of the JMC site. If the site is compromised, an attacker may be able to access a user's cookies allowing them to view sensitive information or hijack an authenticated user's session.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Macromedia Inc.||Affected||29 Sep 2004||04 Oct 2004|
CVSS Metrics (Learn More)
This vulnerability was reported in Macromedia Security Bulletin MPSB04-08.
Macromedia credits Acros for helping to discover and report this issue.
This document was written by Jeff Gennari.
- CVE IDs: Unknown
- Date Public: 23 Sep 2004
- Date First Published: 12 Oct 2004
- Date Last Updated: 12 Oct 2004
- Severity Metric: 5.76
- Document Revision: 97
If you have feedback, comments, or additional information about this vulnerability, please send us email.