← Advisories

Resin Application Server 4.0.36 Cross-Site Scripting Vulnerabilities

Medium
Advisory ID
ZSL-2013-5143
Release Date
07 June 2013
Vendor
Caucho Technology, Inc. - http://www.caucho.com
Affected Version
Resin Professional Web And Application Server 4.0.36
CVE
N/A
Tested On
Resin Professional 4.0.36 (built Fri, 26 Apr 2013 03:33:09 PDT), Java HotSpot(TM) 64-Bit Server VM 23.3-b01, 4 cpu, Windows 7 amd64 6.1
Summary

Resin is the Java Application Server for high traffic sites that require speed and scalability. It is one of the earliest Java Application Servers, and has stood the test of time due to engineering prowess.

Description

Resin Application and Web Server suffers from a XSS issue due to a failure to properly sanitize user-supplied input to the 'logout' GET parameter in the 'index.php' script. URI-based XSS issue is also present and both of the vulnerabilities can be triggered once the user/admin is logged in (post-auth). Attackers can exploit this weakness to execute arbitrary HTML and script code in a user's browser session.

Proof of Concept
Disclosure Timeline
01.06.2013Vulnerability discovered.
01.06.2013Contact with the vendor.
06.06.2013No response from the vendor.
07.06.2013Public security advisory released.
Credits
Vulnerability discovered by Gjoko Krstic
References
Changelog
07.06.2013Initial release
08.06.2013Added reference [1]
09.06.2013Added reference [2]
10.06.2013Added reference [3] and [4]
11.06.2013Added reference [5] and [6]
13.06.2013Added reference [7]
14.06.2013Added reference [8]
17.06.2013Added reference [9]