SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service





Category:   Application (Web Server/CGI)  >   bjServer/BajieServer Vendors:   Zhang, Gang
BajieServer Input Validation Hole Lets Remote Users Conduct Cross-Site Scripting Attacks
SecurityTracker Alert ID:  1006428
SecurityTracker URL:  http://securitytracker.com/id/1006428
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Apr 1 2003
Impact:   Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information
Exploit Included:  Yes  
Version(s): 0.95zxe, 0.95zxc
Description:   An input validation vulnerability was reported in BajieServer. A remote user can conduct cross-site scripting attacks.

SecuriTeam reported that a remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running BajieServer and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

A demonstration exploit URL is provided:

http://[target]/< script>alert('Bajie is not secure')</script>

SecuriTeam credits Luca Ercoli with reporting this flaw.

Impact:   A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running BajieServer, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
Solution:   No solution was available at the time of this entry.
Vendor URL:  www.geocities.com/gzhangx/websrv/index.html (Links to External Site)
Cause:   Input validation error
Underlying OS:  Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  [NEWS] Bajie HTTP Server Cross-Site Scripting Vulnerability


The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

In the US?

Contact Beyond Security at our new California office
housewarming rates on automated network vulnerability
scanning. We also welcome ISPs and other resellers!

Please contact us at: 323-882-8286 or ussales@beyondsecurity.com
- - - - - - - - -



  Bajie HTTP Server Cross-Site Scripting Vulnerability
------------------------------------------------------------------------


SUMMARY

 <http://www.geocities.com/gzhangx/websrv/index.html> Bajie server is "a 
fast jspservlet engine and a stand alone http web server. It is the 
smallest of this kind. Support a wide range of features. It can also act 
as a servlet/JSP engine plugin for apache or IIS via AJP". A cross-site 
scripting vulnerability in the product allows remote attackers to insert 
malicious HTML and JavaScript into the error message shown by the product.

DETAILS

Vulnerable systems:
 * Bajie HTTP Web Server version 0.95zxe
 * Bajie HTTP Web Server version 0.95zxc

Exploit:
http://bajieserver/< script>alert('Bajie is not secure')</script>


ADDITIONAL INFORMATION

The information has been provided by  <mailto:luca.ercoli@inwind.it> Luca 
Ercoli.



======================================== 


This bulletin is sent to members of the SecuriTeam mailing list. 
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com 
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com 


==================== 
==================== 

DISCLAIMER: 
The information in this bulletin is provided "AS IS" without warranty of any kind. 
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business
 profits or special damages. 






 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2018, SecurityGlobal.net LLC