If compromised, Sun's Web server software could allow attackers to target users of the technology through both cross-site scripting (XSS) and denial-of-service (DoS) campaigns

April 2, 2009

4 Min Read

PRESS RELEASE

BOSTON, MA -- April, 1, 2009 -- Core Security Technologies, provider of CORE IMPACT solutions for comprehensive enterprise security testing, has issued an advisory disclosing critical vulnerabilities that could affect large numbers of end users and organizations using Sun's Java System Calendar Express web server software.

Core Security Technologies consultants working with CoreLabs, the research arm of Core Security, unearthed multiple vulnerabilities in Sun's Calendar Express scheduling software, a remote access element of Sun's Java Communications Suite, which, if compromised, could allow attackers to target users of the technology through both cross-site scripting (XSS) and denial-of-service (DoS) campaigns.

Upon making the discoveries, CoreLabs immediately alerted the Sun Security Coordination Team to the vulnerabilities and the two companies have since synchronized efforts to ensure that patches could be created and made available to protect users of the program.

"Although some years ago Cross-Site Scripting vulnerabilities were not considered important or relevant threats by the security intelligentsia, their pervasiveness in almost all kinds of web applications and the possibility for attackers to leverage them to gain control of users' web browsers highlight a real world security problem that merits closer scrutiny and timely resolution," said Ivan Arce, CTO of Core Security Technologies.

Sun's Calendar Express technology is aimed primarily at organizations seeking to offer their users remote access to internal scheduling and messaging tools. This leads CoreLabs researchers to believe that any attackers who become familiar with the reported vulnerabilities could potentially use the flaws to get their hands on sensitive business or personal data or to take systems offline via DoS.

The XSS issues uncovered by researchers in Sun Calendar Express reside in the product's login page and another URL, while the DoS vulnerability could be compromised by simply requesting data from a certain URL twice.

All of the vulnerabilities were initially discovered and researched by the Security Consulting Services team from Core Security Technologies.

Vulnerability Details

Sun Java System Calendar Express

CoreLabs security researchers found multiple XSS vulnerabilities and a single DoS vulnerability in Java System Calendar Express web server, with the XSS flaws located specifically in two individual URLs, and the DoS vulnerability in a third URL.

In the case of the first XSS vulnerability, which affects the login page of the Sun Java System Calendar Express web application, the affected URL is originally accessed through a POST request and can be exploited both with a GET and with a POST request. The contents of the variables involved in a potential attack are not encoded at the time of using them in HTML output, therefore allowing an attacker who controls their content to insert JavaScript code. In the second XSS vulnerability, the contents of the affected URL's date variable are not encoded at the time they are used in HTML output, therefore allowing an attacker who controls their contents to insert JavaScript code. Other fields on this or other pages for this application could also be vulnerable to the same type of issue. Regarding the DoS vulnerability, an attacker can crash the Sun Java System Calendar Express web server by simply requesting data from a specific URL twice. Such a crash can in fact be touched off using any string of alphabetic characters. The first time the data is entered the attacker will receive an error. Entering the data a second time will cause the server to cease responding until the administrator restarts the process. For more information on this vulnerability, please view the CORE-2009-0108 Security Advisory at: http://www.coresecurity.com/content/sun-calendar-express.

About CoreLabs CoreLabs, the research center of Core Security Technologies, is charged with anticipating the future needs and requirements for information security technologies. It conducts its research in several important areas of computer security including system vulnerabilities, cyber attack planning and simulation, source code auditing and cryptography. Its results include problem formalization, identification of vulnerabilities, novel solutions and prototypes for new technologies. CoreLabs regularly publishes security advisories, technical papers, project information and shared software tools for public use at: http://www.coresecurity.com/corelabs.

About Core Security Technologies Core Security Technologies is the leader in comprehensive security testing software solutions that IT executives rely on to expose vulnerabilities, measure operational risk and assure security effectiveness. The company's CORE IMPACT product family offers a comprehensive approach to assessing the security of network systems, endpoint systems, email users and web applications against complex threats. All CORE IMPACT security testing solutions are backed by trusted vulnerability research and leading-edge threat expertise from the company's Security Consulting Services, CoreLabs and Engineering groups. Based in Boston, Mass. and Buenos Aires, Argentina, Core Security Technologies can be reached at 617-399-6980 or on the Web at: http://www.coresecurity.com.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights