Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name CVE-2009-1218 First vendor Publication 2009-04-01
Vendor Cve Last vendor Modification 2018-10-10

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Cvss Base Score 4.3 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Multiple cross-site scripting (XSS) vulnerabilities in Sun Calendar Express Web Server in Sun ONE Calendar Server 6.0 and Sun Java System Calendar Server 6 2004Q2 through 6.3-7.01 allow remote attackers to inject arbitrary web script or HTML via (1) the fmt-out parameter to login.wcap or (2) the date parameter to command.shtml.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1218

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 6
Application 3

ExploitDB Exploits

id Description
2009-03-31 Sun Calendar Express Web Server - (DoS/XSS) Multiple Remote Vulns

Open Source Vulnerability Database (OSVDB)

Id Description
53180 Sun Java System Calendar Server command.shtml date Parameter XSS

Sun Java System Calendar Server contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'date' parameters upon submission to the 'command.shtml' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
53179 Sun Java System Calendar Server login.wcap Fmt-out Parameter XSS

Sun Java System Calendar Server contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'Fmt-out' parameters upon submission to the 'login.wcap' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Nessus® Vulnerability Scanner

Date Description
2009-05-27 Name : The remote web server uses a script that is affected by a cross-site scriptin...
File : sun_calendar_server_fmt_out_xss.nasl - Type : ACT_ATTACK
2008-06-18 Name : The remote host is missing Sun Security Patch number 121657-54
File : solaris10_121657.nasl - Type : ACT_GATHER_INFO
2008-06-18 Name : The remote host is missing Sun Security Patch number 121658-54
File : solaris10_x86_121658.nasl - Type : ACT_GATHER_INFO
2008-06-18 Name : The remote host is missing Sun Security Patch number 121657-54
File : solaris9_121657.nasl - Type : ACT_GATHER_INFO
2008-06-18 Name : The remote host is missing Sun Security Patch number 121658-54
File : solaris9_x86_121658.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/34152
http://www.securityfocus.com/bid/34153
BUGTRAQ http://www.securityfocus.com/archive/1/502320/100/0/threaded
MISC http://www.coresecurity.com/content/sun-calendar-express
SUNALERT http://sunsolve.sun.com/search/document.do?assetkey=1-26-256228-1
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020321.1-1
VUPEN http://www.vupen.com/english/advisories/2009/0905

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
Date Informations
2021-05-04 12:09:23
  • Multiple Updates
2021-04-22 01:09:43
  • Multiple Updates
2020-05-23 00:23:36
  • Multiple Updates
2018-10-11 00:19:34
  • Multiple Updates
2014-02-17 10:49:37
  • Multiple Updates
2013-05-10 23:48:06
  • Multiple Updates