Note: This is an archival copy of Security Sun Alert 201348 as previously published on http://sunsolve.sun.com.|
Latest version of this security advisory is available from http://support.oracle.com as Sun Alert 1001021.1.
Java 2 Platform, Standard Edition
Date of Resolved Release
A defect in the Javadoc tool in various releases of the JDK may lead to the generation of HTML documentation pages which contain a potential cross-site scripting (XSS) vulnerability. This may allow a remote user to gain access to cookies from the website that hosts the generated documentation.
Sun acknowledges, with thanks, Martin Straka, for bringing this issue to our attention.
This issue can occur in the following releases for all platforms (Solaris, Linux, and Windows):
Note: The Javadoc tool included in SDK 1.4.x and earlier is not affected by this issue.
To determine the version of Java on a system, the following command can be run:
% java -version java version "1.5.0_02-b09"
For this vulnerability to be exploited, a user must click a link (created by a malicious user) in a website or email that points to a vulnerable "index.html" documentation page. The user's cookies from the website that hosts the "index.html" documentation page may then be accessed by the malicious user.
There are no predictable symptoms that would indicate the described issue has been exploited.
Please see the "Note" in the Resolution section below.
This issue is addressed in the following releases for all platforms (Solaris, Linux, and Windows):
J2SE 5.0 Update 12 for Solaris is available in the following patches:
JDK 5.0 is available for download at the following link:
Java SE 6 Update 1 for Solaris is available in the following patches:
JDK 6 is available for download at the following link:
Note: In order to fully resolve this issue, any "index.html" page that was generated with an affected version of the Javadoc tool must be regenerated using a Javadoc tool in one of the releases mentioned in this resolution section.
This solution has no attachment