{"vuid":"VU#881254","idnumber":"881254","name":"Sun Java System Portal Server fails to properly handle changes to display options","keywords":["Sun Java System Portal Server","Calendar Server","display options","non-default view","administrative credentials"],"overview":"There is a vulnerability in the Sun Java System Portal Server, which could allow a remote, authenticated user to gain access to the administrative credentials of the Calendar server.","clean_desc":"The Sun Java System Portal Server is a content management system that provides centralized login capabilities and administration. The Calendar Server is an optional product that can be used by the portal server to provide users the ability to collaboratively manage schedules and share resources. A vulnerability exists in the way changes to the display options are handled by the Sun Java System Portal Server. By changing the display options to a non-default view, a user could gain access to the administrative credentials on the Calendar Server. According to the Sun Security Alert, this vulnerability only occurs if the following two conditions are true: Admin Proxy Authentication is configured on the Calendar Server \nCalendar access is via the \"Portal\" communication channel and not the \"Unified Web Client\" or the \"Calendar Web Client\" \nNote: This issue only affects the calendar component. The calendar configuration information is not affected.","impact":"A remote, authenticated user could gain access to the administrative credentials of the Calendar server.","resolution":"Apply Patch\nSun has released an advisory which addresses this issue. For more information on patches available for your system, please refer to Sun Security Alert: 57586.","workarounds":"Restrict Access\nSun recommends that you not allow end users the ability to edit the calendar channels \"calendar\" or \"view\" display profile properties when Admin Proxy Authentication is enabled.","sysaffected":"","thanks":"This vulnerability was reported by Sun Microsystems.","author":"This document was written by Damon Morda.","public":["http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57586","http://wwws.sun.com/software/products/portal_srvr/home_portal.html","http://wwws.sun.com/software/products/calendar_srvr/home_calendar.html","http://docs.sun.com/source/816-6748-10/comm_config.html#wp34042","http://secunia.com/advisories/12134/","http://www.securitytracker.com/alerts/2004/Jul/1010756.html"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-07-23T13:23:09Z","publicdate":"2004-07-21T00:00:00Z","datefirstpublished":"2004-07-23T15:09:10Z","dateupdated":"2004-07-23T15:13:41Z","revision":17,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"5","cam_impact":"10","cam_easeofexploitation":"10","cam_attackeraccessrequired":"7","cam_scorecurrent":"1.3125","cam_scorecurrentwidelyknown":"1.640625","cam_scorecurrentwidelyknownexploited":"2.953125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":1.3125,"vulnote":null}