Note: This is an archival copy of Security Sun Alert 259588 as previously published on http://sunsolve.sun.com.|
Latest version of this security advisory is available from http://support.oracle.com as Sun Alert 1020504.1.
Sun Java System Web Server 6.1
Date of Resolved Release
Cross-Site Scripting (XSS) Vulnerability in the Sun Java System Web Server 6.1 Reverse Proxy Plug-in
A Cross-Site Scripting (XSS) security vulnerability in the Sun Java System Web Server 6.1 Reverse Proxy Plug-in may allow a local or remote unprivileged user to execute arbitrary script or HTML within a user's browser which can lead to hijacked sessions, stolen cookie information, and a loss of data privacy between a client and the server.
2. Contributing Factors
This issue can occur in the following releases:
To determine the version of Sun Java System Web Server 6.1 on a system, the following command can be run:
$ <WS-install>/https-<host>/start -version(Where <WS-install> is the installation directory of the Web Server and <host> should be the actual host name on which the Web Server is installed).
This issue only affects Web Server installations which are making use of the Reverse Proxy Plug-in. To determine if this plug-in is in use on a host, the 'magnus.conf' configuration file can be examined, searching for the 'libpassthrough.so' entry. This file is stored in the 'config' directory within the root directory of each Web Server instance installation. For example:
# cd <server-root>/config3. Symptoms
There are no predictable symptoms that would indicate the described issue has been exploited to execute arbitrary script or HTML on the system.
There is no workaround for this issue. Please see the Resolution section below.
This issue is addressed in the following releases:
For more information on Security Sun Alerts, see 1009886.1.
Copyright 2000-2009 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, CA 95054 U.S.A. All rights reserved.
This solution has no attachment