|
Message-ID: <Pine.GSO.4.51.0910071754350.1485@faron.mitre.org> Date: Wed, 7 Oct 2009 17:54:44 -0400 (EDT) From: "Steven M. Christey" <coley@...us.mitre.org> To: oss-security@...ts.openwall.com Subject: Re: CVE id request: jetty ====================================================== Name: CVE-2009-3579 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3579 Reference: BUGTRAQ:20091006 CORE-2009-0922: Jetty Persistent XSS in Sample Cookies Application Reference: URL:http://www.securityfocus.com/archive/1/archive/1/507013/100/0/threaded Reference: MISC:http://www.coresecurity.com/content/jetty-persistent-xss Cross-site scripting (XSS) vulnerability in the CookieDump.java sample application in Mort Bay Jetty 6.1.19 and 6.1.20 allows remote attackers to inject arbitrary web script or HTML via the Value parameter in a GET request to cookie/.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.