BajieServer Input Validation Hole Lets Remote Users Conduct Cross-Site Scripting Attacks
SecurityTracker Alert ID: 1006428|
SecurityTracker URL: http://securitytracker.com/id/1006428
(Links to External Site)
Date: Apr 1 2003
Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information|
Exploit Included: Yes |
Version(s): 0.95zxe, 0.95zxc|
An input validation vulnerability was reported in BajieServer. A remote user can conduct cross-site scripting attacks.|
SecuriTeam reported that a remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running BajieServer and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
A demonstration exploit URL is provided:
http://[target]/< script>alert('Bajie is not secure')</script>
SecuriTeam credits Luca Ercoli with reporting this flaw.
A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running BajieServer, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.|
No solution was available at the time of this entry.|
Vendor URL: www.geocities.com/gzhangx/websrv/index.html (Links to External Site)
Input validation error|
|Underlying OS: Windows (Any)|
Source Message Contents
Subject: [NEWS] Bajie HTTP Server Cross-Site Scripting Vulnerability|
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
In the US?
Contact Beyond Security at our new California office
housewarming rates on automated network vulnerability
scanning. We also welcome ISPs and other resellers!
Please contact us at: 323-882-8286 or firstname.lastname@example.org
- - - - - - - - -
Bajie HTTP Server Cross-Site Scripting Vulnerability
<http://www.geocities.com/gzhangx/websrv/index.html> Bajie server is "a
fast jspservlet engine and a stand alone http web server. It is the
smallest of this kind. Support a wide range of features. It can also act
as a servlet/JSP engine plugin for apache or IIS via AJP". A cross-site
scripting vulnerability in the product allows remote attackers to insert
* Bajie HTTP Web Server version 0.95zxe
* Bajie HTTP Web Server version 0.95zxc
http://bajieserver/< script>alert('Bajie is not secure')</script>
The information has been provided by <mailto:email@example.com> Luca
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: firstname.lastname@example.org
In order to subscribe to the mailing list, simply forward this email to: email@example.com
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business
profits or special damages.