Sun Java Web Server Vulnerability

In February of 2000 CERT Coordination Center released an advisory titled "Malicious HTML Tags Embedded in Client Web Requests" (advisory attached in 'Credit' section"). This advisory was a joint release by the CERT Coordination Center, DoD-CERT, the DoD Joint Task Force for Computer Network Defense (JTF-CND), the Federal Computer Incident Response Capability (FedCIRC), and the National Infrastructure Protection Center (NIPC). The point of the advisory in essence was a warning about client side vulnerabilities brought about by malicious scripting from Rogue websites which could be exploited to run code on client side browsers (acting as unwary interpreters for the scripting in question). Shortly after this advisory was released Sun Microsystems released a FAQ (attached in 'Credit' section") for their Java(TM) Web Server detailing how this type of vulnerability could be used to exploit their actual webserver via the example scripts shipped with the product.

Somewhat later this already public information was expounded upon in a security advisory posted to Bugtraq with precise details on how to exploit this vulnerability provided users had not already heeded the Sun or CERT notice on this issue.


Privacy Statement
Copyright 2010, SecurityFocus