{"vuid":"VU#245081","idnumber":"245081","name":"Accoria Rock Web Server contains multiple vulnerabilities","keywords":[""],"overview":"Accoria Web Server contains multiple vulnerabilities that collectively could allow an attacker to execute commands through the administration interface.","clean_desc":"The Accoria web server, also known as Rock Web Server, contains several cross-site scripting (XSS) and cross-site request forgery (XSRF) vulnerabilities. Directory traversal and format string vulnerabilities exist as well. The getenv sample code contains an XSS vulnerability when viewed by Internet Explorer 6 or other web browsers that do not follow RFC 2616 Section 7.2.1. Generated cookies appear to be weak and predictable, which may allow an attacker to bypass authentication. Further details are available from the IOActive security advisory.","impact":"A remote and unauthenticated attacker may be able to execute commands in the context of the web server administrator.","resolution":"Apply an update\nThe vendor recommends all users upgrade to version 1.5.2 or later.","workarounds":"Restrict access Appropriate firewall rules should be set up to limit access to the web server's administration interface to only trusted sources. XSRF protection To avoid XSRF attacks, do not click on links from untrusted sources while logged into the administration interface.","sysaffected":"","thanks":"Thank you to Ilja van Sprundel of IOActive for researching and reporting these vulnerabilities.","author":"This document was written by Jared Allar.","public":["http://www.ioactive.com/pdfs/AccoriaWebServer.pdf","http://tools.ietf.org/html/rfc2616#section-7.2.1"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2010-05-12T15:45:55Z","publicdate":"2010-05-19T00:00:00Z","datefirstpublished":"2010-06-01T19:42:50Z","dateupdated":"2010-06-22T18:18:37Z","revision":25,"vrda_d1_directreport":"1","vrda_d1_population":"1","vrda_d1_impact":"3","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"4","cam_population":"4","cam_impact":"11","cam_easeofexploitation":"18","cam_attackeraccessrequired":"11","cam_scorecurrent":"3.10365","cam_scorecurrentwidelyknown":"3.9204","cam_scorecurrentwidelyknownexploited":"7.1874","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":3.10365,"vulnote":null}