===================================================================== CERT-Renater Note d'Information No. 2009/VULN197 _____________________________________________________________________ DATE : 25/05/2009 HARDWARE PLATFORM(S) : / OPERATING SYSTEM(S) : Systems running Sun Java System Portal Server. ====================================================================== http://sunsolve.sun.com/search/printfriendly.do?assetkey=1-66-256588-1 ______________________________________________________________________ Solution Type: Sun Alert Solution 256588 : A Cross-Site Scripting (XSS) Vulnerability in Sun Java System Portal Server's Error Page May Lead to Execution of Arbitrary Code Bug ID: 6750036 Product Sun Java System Portal Server 6.3.1 Sun Java System Portal Server 7.1 Sun Java System Portal Server 7.2 Date of Resolved Release: 22-May-2009 SA Document Body A Cross-Site Scripting (XSS) Vulnerability in Sun Java System Portal Server's Error Page May Lead to Execution of Arbitrary Code 1. Impact A Cross-Site Scripting (XSS) security vulnerability exists in Sun Java System Portal Server within one of its error pages that may allow remote users to execute arbitrary JavaScript code in a user's web browser, which can lead to various impacts including the theft of sensitive information such as cookie information, access to user credentials, or the hijacking of sessions. 2. Contributing Factors This issue can occur in the following releases: SPARC Platform * Sun Java System Portal Server 6.3.1 (for Solaris 8, 9, and 10) without patch 118950-38 * Sun Java System Portal Server 7.1 (for Solaris 9 and 10) without patch 124301-13 * Sun Java System Portal Server 7.2 (for Solaris 9 and 10) without patch 138686-02 x86 Platform * Sun Java System Portal Server 6.3.1 (for Solaris 8, 9, and 10) without patch 118951-38 * Sun Java System Portal Server 7.1 (for Solaris 9 and 10) without patch 124302-13 * Sun Java System Portal Server 7.2 (for Solaris 9 and 10) without patch 138687-02 Linux * Sun Java System Portal Server 6.3.1 without patch 118952-38 * Sun Java System Portal Server 7.1 without patch 124303-13 * Sun Java System Portal Server 7.2 without patch 138688-02 To determine the version of Sun Java System Portal Server Software installed on a system, the following command can be run: on Portal Server 6.3.1: $ /SUNWps/bin/version -p Currently, 14 SunOne Portal Server / SRA 6.x patches are installed: - ------------------------------------------------------------------ 116736-19, 118195-05, 118128-13, 119898-04, 118950-32, 118950-34, [ 13]118950-12, 116738-19, 116740-19, 116742-19, 116749-19, 118115-11, 118219-11, 1 22439-02 on Portal Server 7.1/7.2: $ /SUNWportal/bin/psadmin version -u amadmin --patches Fri Jun 20 07:37:07 PDT 2008 Sun Java(tm) System Portal Server 7.1 Currently, there are no patches installed !! 3. Symptoms There are no predictable symptoms that would indicate the described issue has been exploited. 4. Workaround There is no workaround for this issue. Please see the Resolution section below. 5. Resolution This issue is addressed in the following releases: SPARC Platform * Sun Java System Portal Server 6.3.1 (for Solaris 8, 9, and 10) with patch 118950-38 or later * Sun Java System Portal Server 7.1 (for Solaris 9 and 10) with patch 124301-13 or later * Sun Java System Portal Server 7.2 (for Solaris 9 and 10) with patch 138686-02 or later x86 Platform * Sun Java System Portal Server 6.3.1 (for Solaris 8, 9, and 10) with patch 118951-38 or later * Sun Java System Portal Server 7.1 (for Solaris 9 and 10) with patch 124302-13 or later * Sun Java System Portal Server 7.2 (for Solaris 9 and 10) with patch 138687-02 or later Linux * Sun Java System Portal Server 6.3.1 with patch 118952-38 or later * Sun Java System Portal Server 7.1 with patch 124303-13 or later * Sun Java System Portal Server 7.2 with patch 138688-02 or later For more information on Security Sun Alerts, see Technical Instruction ID 213557. This Sun Alert notification is being provided to you on an "AS IS" basis. This Sun Alert notification may contain information provided by third parties. The issues described in this Sun Alert notification may or may not impact your system(s). Sun makes no representations, warranties, or guarantees as to the information contained herein. ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT, ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT YOU ACKNOWLEDGE THAT SUN SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN. This Sun Alert notification contains Sun proprietary and confidential information. It is being provided to you pursuant to the provisions of your agreement to purchase services from Sun, or, if you do not have such an agreement, the Sun.com Terms of Use. This Sun Alert notification may only be used for the purposes contemplated by these agreements. Copyright 2000-2009 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, CA 95054 U.S.A. All rights reserved ====================================================================== ========================================================= Les serveurs de référence du CERT-Renater http://www.urec.fr/securite http://www.cru.fr/securite http://www.renater.fr ========================================================= + CERT-RENATER | tel : 01-53-94-20-44 + + 151 bd de l'Hopital | fax : 01-53-94-20-41 + + 75013 Paris | email: certsvp@renater.fr + =========================================================