First published: Fri Apr 17 2009(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 allow remote attackers to inject arbitrary web script or HTML via the (1) name, (2) ip, (3) username, or (4) description parameter to console/portal/Server/Monitoring; or (5) the PATH_INFO to the default URI under console/portal/.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.geronimo.plugins:console | >=2.1.0<2.1.4 | 2.1.4 |
Red Hat Geronimo | =2.1.2 | |
Red Hat Geronimo | =2.1.1 | |
Red Hat Geronimo | =2.1 | |
Red Hat Geronimo | =2.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0038 is classified as a high severity vulnerability due to its potential for remote exploitation.
To fix CVE-2009-0038, upgrade to Apache Geronimo version 2.1.4 or later to mitigate the XSS vulnerabilities.
CVE-2009-0038 affects Apache Geronimo versions 2.1 through 2.1.3.
CVE-2009-0038 can allow remote attackers to perform cross-site scripting (XSS) attacks through specific parameters in the web administration console.
Yes, there are known exploits for CVE-2009-0038 that leverage the XSS vulnerabilities in the affected versions of Apache Geronimo.