Apache MyFaces Tomahawk JSF Application autoscroll Multiple XSS

medium Nessus Plugin ID 25546

Synopsis

The remote web server uses a JSP framework that is vulnerable to a cross-site scripting attack.

Description

The remote web server uses an implementation of the Apache MyFaces Tomahawk JSF framework that fails to sanitize user-supplied input to the 'autoScroll' parameter before using it to generate dynamic content. An unauthenticated, remote attacker may be able to leverage this issue to inject arbitrary HTML or script code into a user's browser to be executed within the security context of the affected site.

Solution

Upgrade to MyFaces Tomahawk version 1.1.6 or later.

See Also

http://www.nessus.org/u?7f1297cd

https://www.securityfocus.com/archive/1/471397/30/0/threaded

https://issues.apache.org/jira/browse/TOMAHAWK-983

http://www.nessus.org/u?cf864114

Plugin Details

Severity: Medium

ID: 25546

File Name: myfaces_tomahawk_autoscroll_xss.nasl

Version: 1.22

Type: remote

Published: 6/19/2007

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.8

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: cpe:/a:apache:myfaces_tomahawk

Exploit Ease: No exploit is required

Patch Publication Date: 6/13/2007

Vulnerability Publication Date: 5/10/2007

Reference Information

CVE: CVE-2007-3101

BID: 24480

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990