Synopsis
The remote web server is itself prone to cross-site scripting attacks.
Description
The remote web server seems to be vulnerable to cross-site scripting attacks because it fails to sanitize input supplied as a filename when displaying an error page.
The vulnerability would allow an attacker to make the server present the user with the attacker's JavaScript/HTML code. Since the content is presented by the server, the user will give it the trust level of the server (for example, the trust level of banks, shopping centers, etc would usually be high).
Solution
Upgrade to the latest version of WebSphere.
Plugin Details
File Name: websphere_xss.nasl
Configuration: Enable thorough checks
Supported Sensors: Nessus
Vulnerability Information
CPE: cpe:/a:ibm:websphere_application_server
Required KB Items: www/ibm-http
Exploit Ease: Exploits are available
Reference Information
BID: 2401
CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990