CVE-2009-0038
Apache Geronimo 2.1.x - '/console/portal/' URI Cross-Site Scripting
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
4Exploited in Wild
-Decision
Descriptions
Multiple cross-site scripting (XSS) vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 allow remote attackers to inject arbitrary web script or HTML via the (1) name, (2) ip, (3) username, or (4) description parameter to console/portal/Server/Monitoring; or (5) the PATH_INFO to the default URI under console/portal/.
Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en la consola de administración web en Apache Geronimo Application Server 2.1 a 2.1.3 permiten a atacantes remotos inyectar secuencias de comandos web o HTML de su elección mediante los parámetros (1) name, (2) ip, (3) username, o (4) description para console/portal/Server/Monitoring; o (5) el PATH_INFO para la URI por defecto bajo console/portal/.
Apache Geronimo Application Server versions 2.1 through 2.1.3 suffer from multiple cross site scripting vulnerabilities.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2008-12-15 CVE Reserved
- 2009-04-16 CVE Published
- 2009-04-16 First Exploit
- 2024-08-07 CVE Updated
- 2024-10-26 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (9)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/34715 | Third Party Advisory | |
http://www.securityfocus.com/archive/1/502734/100/0/threaded | Mailing List | |
http://www.vupen.com/english/advisories/2009/1089 | Vdb Entry |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/32921 | 2009-04-16 | |
https://www.exploit-db.com/exploits/32920 | 2009-04-16 | |
http://dsecrg.com/pages/vul/show.php?id=119 | 2024-08-07 | |
http://www.securityfocus.com/bid/34562 | 2024-08-07 |
URL | Date | SRC |
---|---|---|
http://geronimo.apache.org/21x-security-report.html#2.1.xSecurityReport-214 | 2018-10-11 | |
http://issues.apache.org/jira/browse/GERONIMO-4597 | 2018-10-11 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Apache Search vendor "Apache" | Geronimo Search vendor "Apache" for product "Geronimo" | 2.1 Search vendor "Apache" for product "Geronimo" and version "2.1" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Geronimo Search vendor "Apache" for product "Geronimo" | 2.1.1 Search vendor "Apache" for product "Geronimo" and version "2.1.1" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Geronimo Search vendor "Apache" for product "Geronimo" | 2.1.2 Search vendor "Apache" for product "Geronimo" and version "2.1.2" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Geronimo Search vendor "Apache" for product "Geronimo" | 2.1.3 Search vendor "Apache" for product "Geronimo" and version "2.1.3" | - |
Affected
|