This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Caucho First view 2004-11-23
Product Resin Last view 2022-04-04
Version Type Application
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:caucho:resin:2.1.12:*:*:*:*:*:*:* 9
cpe:2.3:a:caucho:resin:3.1.0:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:2.1.15:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:3.1.1:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:2.0.1:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:3.0.17:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:2.1.13:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:3.0.16:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:3.0.1:beta:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:3.0.8:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:3.0.9:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:3.0.6:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:3.0.7:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:3.0.5:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:3.0.0:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:3.1.3:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:3.1.2:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:2.1.9:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:2.1.4:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:2.1.3:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:2.1.6:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:2.0.2:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:2.0.5:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:2.1.14:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:2.1.16:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:3.0.2:beta:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:3.0.12:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:*:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:3.1.10:-:pro:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:3.1.5:-:pro:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:4.0.6:-:pro:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:3.0.10:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:3.0.15:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:2.1.11:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:2.1.snap:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:3.0.14:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:3.0.18:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:2.1.7:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:3.0.3:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:2.0.0:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:3.0.13:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:3.0.11:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:3.0.20:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:3.0.19:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:3.0.4:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:2.1.8:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:2.1.10:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:2.1.5:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:2.0.3:*:*:*:*:*:*:* 8
cpe:2.3:a:caucho:resin:2.1.1:*:*:*:*:*:*:* 8

Related : CVE

  Date Alert Description
7.5 2022-04-04 CVE-2021-44138

There is a Directory traversal vulnerability in Caucho Resin, as distributed in Resin 4.0.52 - 4.0.56, which allows remote attackers to read files in arbitrary directories via a ; in a pathname within an HTTP request.

5 2014-07-26 CVE-2014-2966

The ISO-8859-1 encoder in Resin Pro before 4.0.40 does not properly perform Unicode transformations, which allows remote attackers to bypass intended text restrictions via crafted characters, as demonstrated by bypassing an XSS protection mechanism.

6.4 2012-08-12 CVE-2012-2969

Caucho Quercus, as distributed in Resin before 4.0.29, allows remote attackers to bypass intended restrictions on filename extensions for created files via a %00 sequence in a pathname within an HTTP request.

5 2012-08-12 CVE-2012-2968

Directory traversal vulnerability in Caucho Quercus, as distributed in Resin before 4.0.29, allows remote attackers to create files in arbitrary directories via a .. (dot dot) in a pathname within an HTTP request.

7.5 2012-08-12 CVE-2012-2967

Caucho Quercus, as distributed in Resin before 4.0.29, does not properly implement the == (equals sign equals sign) operator for comparisons, which has unspecified impact and context-dependent attack vectors.

7.5 2012-08-12 CVE-2012-2966

Caucho Quercus, as distributed in Resin before 4.0.29, overwrites entries in the SERVER superglobal array on the basis of POST parameters, which has unspecified impact and remote attack vectors.

7.5 2012-08-12 CVE-2012-2965

Caucho Quercus, as distributed in Resin before 4.0.29, does not properly handle unspecified characters in the names of variables, which has unknown impact and remote attack vectors, related to an "HTTP Parameter Contamination" issue.

4.3 2010-05-24 CVE-2010-2032

Multiple cross-site scripting (XSS) vulnerabilities in resin-admin/digest.php in Caucho Technology Resin Professional 3.1.5, 3.1.10, 4.0.6, and possibly other versions allow remote attackers to inject arbitrary web script or HTML via the (1) digest_realm or (2) digest_username parameters. NOTE: some of these details are obtained from third party information.

4.3 2008-06-30 CVE-2008-2462

Cross-site scripting (XSS) vulnerability in the viewfile documentation command in Caucho Resin before 3.0.25, and 3.1.x before 3.1.4, allows remote attackers to inject arbitrary web script or HTML via the file parameter.

5 2004-11-23 CVE-2004-0281

Caucho Technology Resin 2.1.12 allows remote attackers to gain sensitive information and view the contents of the /WEB-INF/ directory via an HTTP request for "WEB-INF..", which is equivalent to "WEB-INF" in Windows.

CWE : Common Weakness Enumeration

%idName
25% (2) CWE-264 Permissions, Privileges, and Access Controls
25% (2) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
25% (2) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...
25% (2) CWE-20 Improper Input Validation

Open Source Vulnerability Database (OSVDB)

id Description
64751 Caucho Resin resin-admin/digest.php Multiple Parameter XSS
46515 Caucho Resin Documentation viewfile Command file Parameter XSS
6620 Caucho Resin WEB-INF Encoded Request Information Disclosure

OpenVAS Exploits

id Description
2010-05-28 Name : Caucho Resin Multiple Cross-Site Scripting Vulnerabilities
File : nvt/secpod_caucho_resin_mult_xss_vuln.nasl

Nessus® Vulnerability Scanner

id Description
2010-05-21 Name: The remote web server hosts a PHP script that is prone to cross-site scriptin...
File: resin_digest_xss.nasl - Type: ACT_ATTACK
2008-06-30 Name: The remote web server contains a Java Servlet that is affected by a cross-sit...
File: resin_viewfile_xss.nasl - Type: ACT_ATTACK