First published: Fri Jan 11 2008(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in Sun Java System Identity Manager 6.0 SP1 through SP3, 7.0, and 7.1 allow remote attackers to inject arbitrary HTML or web script via the (1) cntry or lang parameters to /idm/login.jsp, (2) resultsForm parameter to /idm/account/findForSelect.jsp, or (3) activeControl parameter to /idm/user/main.jsp.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sun Java System Identity Manager | =6.0-sp2 | |
Sun Java System Identity Manager | =7.0 | |
Sun Java System Identity Manager | =6.0-sp1 | |
Sun Java System Identity Manager | =7.1 | |
Sun Java System Identity Manager | =6.0-sp3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0239 is classified as a high severity vulnerability due to its potential for exploitation through cross-site scripting.
To fix CVE-2008-0239, ensure that you are using an updated version of the Sun Java System Identity Manager that is not vulnerable to XSS.
CVE-2008-0239 affects Sun Java System Identity Manager versions 6.0 SP1 through SP3, 7.0, and 7.1.
CVE-2008-0239 is a cross-site scripting (XSS) vulnerability that allows for the injection of arbitrary HTML or web scripts.
Yes, CVE-2008-0239 can be exploited remotely by attackers to execute unwanted scripts in the context of a user’s browser.