{"vuid":"VU#305208","idnumber":"305208","name":"Caucho Resin vulnerable to XSS via \"file\" parameter to \"viewfile\"","keywords":["Caucho","Resin","xss","cross-site scripting","file","/resin-doc/examples/quercus-hello/viewfile","example script","viewfile.xsl"],"overview":"The \"viewfile\" command provided by Caucho Resin contains a cross-site scripting (XSS) vulnerability in the \"file\" parameter.","clean_desc":"Caucho Resin is a Java-based application server. The \"viewfile\" command that is provided with the Resin documentation is vulnerable to XSS via the \"file\" parameter.","impact":"A remote, unauthenticated attacker may be able to execute arbitrary script within the context of the Resin web pages.","resolution":"Apply an update\nThis issue is resolved in Resin 3.0.25 and 3.1.4. Note that the vendor does not recommend including the Resin documentation on production web servers, which would prevent the vulnerable command from being exposed.","workarounds":"","sysaffected":"","thanks":"Thanks to Tomasz Kuczynski for reporting this vulnerability.","author":"This document was written by Will Dormann.","public":["http://www.caucho.com/","http://www.caucho.com/resin/changes/changes-31.xtp#3.1.4%20-%20Dec%205,%202007"],"cveids":["CVE-2008-2462"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-06-25T18:50:53Z","publicdate":"2007-12-05T00:00:00Z","datefirstpublished":"2008-06-25T20:50:05Z","dateupdated":"2008-06-25T20:50:15Z","revision":2,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"8","cam_exploitation":"0","cam_internetinfrastructure":"17","cam_population":"4","cam_impact":"11","cam_easeofexploitation":"18","cam_attackeraccessrequired":"16","cam_scorecurrent":"5.94","cam_scorecurrentwidelyknown":"8.7912","cam_scorecurrentwidelyknownexploited":"13.5432","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":5.94,"vulnote":null}