First published: Fri Nov 28 2008(Updated: )
Cross-site scripting (XSS) vulnerability in configuration/httpListenerEdit.jsf in the GlassFish 2 UR2 b04 webadmin interface in Sun Java System Application Server 9.1_01 build b09d-fcs and 9.1_02 build b04-fcs allows remote attackers to inject arbitrary web script or HTML via the name parameter, a different vector than CVE-2008-2751.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Java System Application Server | =9.1_01-b09d-fcs | |
Oracle Java System Application Server | =9.1_02-b04-fcs | |
Oracle GlassFish Enterprise Server | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5266 has a medium severity rating due to its potential for cross-site scripting (XSS) attacks.
To fix CVE-2008-5266, ensure that you upgrade to a patched version of the Sun Java System Application Server or apply the necessary security updates.
CVE-2008-5266 affects Sun Java System Application Server versions 9.1_01-b09d-fcs, 9.1_02-b04-fcs, and Oracle GlassFish Server version 2.0.
CVE-2008-5266 can be exploited to conduct arbitrary web script injection attacks via cross-site scripting (XSS).
While CVE-2008-5266 is an older vulnerability, it remains relevant for any systems still using affected versions of Sun Java System Application Server or Oracle GlassFish Server.