This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Caucho First view 2008-06-30
Product Resin Last view 2022-04-04
Version 2.1.14 Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:caucho:resin

Activity : Overall

Related : CVE

  Date Alert Description
7.5 2022-04-04 CVE-2021-44138

There is a Directory traversal vulnerability in Caucho Resin, as distributed in Resin 4.0.52 - 4.0.56, which allows remote attackers to read files in arbitrary directories via a ; in a pathname within an HTTP request.

5 2014-07-26 CVE-2014-2966

The ISO-8859-1 encoder in Resin Pro before 4.0.40 does not properly perform Unicode transformations, which allows remote attackers to bypass intended text restrictions via crafted characters, as demonstrated by bypassing an XSS protection mechanism.

6.4 2012-08-12 CVE-2012-2969

Caucho Quercus, as distributed in Resin before 4.0.29, allows remote attackers to bypass intended restrictions on filename extensions for created files via a %00 sequence in a pathname within an HTTP request.

5 2012-08-12 CVE-2012-2968

Directory traversal vulnerability in Caucho Quercus, as distributed in Resin before 4.0.29, allows remote attackers to create files in arbitrary directories via a .. (dot dot) in a pathname within an HTTP request.

7.5 2012-08-12 CVE-2012-2967

Caucho Quercus, as distributed in Resin before 4.0.29, does not properly implement the == (equals sign equals sign) operator for comparisons, which has unspecified impact and context-dependent attack vectors.

7.5 2012-08-12 CVE-2012-2966

Caucho Quercus, as distributed in Resin before 4.0.29, overwrites entries in the SERVER superglobal array on the basis of POST parameters, which has unspecified impact and remote attack vectors.

7.5 2012-08-12 CVE-2012-2965

Caucho Quercus, as distributed in Resin before 4.0.29, does not properly handle unspecified characters in the names of variables, which has unknown impact and remote attack vectors, related to an "HTTP Parameter Contamination" issue.

4.3 2008-06-30 CVE-2008-2462

Cross-site scripting (XSS) vulnerability in the viewfile documentation command in Caucho Resin before 3.0.25, and 3.1.x before 3.1.4, allows remote attackers to inject arbitrary web script or HTML via the file parameter.

CWE : Common Weakness Enumeration

%idName
28% (2) CWE-264 Permissions, Privileges, and Access Controls
28% (2) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...
28% (2) CWE-20 Improper Input Validation
14% (1) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')

Open Source Vulnerability Database (OSVDB)

id Description
46515 Caucho Resin Documentation viewfile Command file Parameter XSS

Nessus® Vulnerability Scanner

id Description
2008-06-30 Name: The remote web server contains a Java Servlet that is affected by a cross-sit...
File: resin_viewfile_xss.nasl - Type: ACT_ATTACK