Vulnerabilities > CVE-2004-0646 - Unspecified vulnerability in Macromedia Coldfusion and Jrun
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN macromedia
nessus
Summary
Buffer overflow in the WriteToLog function for JRun 3.0 through 4.0 web server connectors, such as (1) mod_jrun and (2) mod_jrun20 for Apache, with verbose logging enabled, allows remote attackers to execute arbitrary code via a long HTTP header Content-Type field or other fields.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 5 |
Nessus
NASL family | Web Servers |
NASL id | JRUN_MULTIPLE_FLAWS.NASL |
description | The remote host is running JRun, a J2EE application server running on top of IIS or Apache. There are multiple flaws in the remote version of this software : - The JSESSIONID variable is not implemented securely. An attacker may use this flaw to guess the session id number of other users. Only JRun 4.0 is affected. - There is a code disclosure issue that may allow an attacker to obtain the contents of a .cfm file by appending |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 14810 |
published | 2004-09-24 |
reporter | This script is Copyright (C) 2004-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/14810 |
title | JRun Multiple Vulnerabilities (OF, XSS, ID, Hijacking) |
code |
|
Saint
bid | 11245 |
description | JRun mod_jrun WriteToLog buffer overflow |
osvdb | 10546 |
title | jrun_writetolog_bo |
type | remote |
References
- http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html
- http://www.securityfocus.com/bid/11245
- http://www.securityfocus.com/archive/1/377194
- http://www.macromedia.com/devnet/security/security_zone/mpsb04-09.html
- http://www.kb.cert.org/vuls/id/990200
- http://secunia.com/advisories/12647/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17485