Miggo Logo

CVE-2006-0254: Apache Geronimo console 1.0 vulnerable to cross-site scripting

4.3

CVSS Score

Basic Information

EPSS Score
0.97455%
Published
5/1/2022
Updated
1/27/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
AV:N/AC:M/Au:N/C:N/I:P/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
geronimo:geronimo-console-standardmaven< 1.11.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability manifests when: 1) Attackers inject XSS payloads via parameters (like 'time' in cal2.jsp) 2) Server logs store unescaped payloads 3) Admin views logs through console JSPs that originally rendered content without escaping. The patch adds JSTL escaping in three log viewer JSPs. In runtime detection, the _jspService methods of these compiled JSP servlets would appear in profilers when malicious log entries are rendered.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Multipl* *ross-sit* s*riptin* (XSS) vuln*r**iliti*s in *p**** **ronimo *.* *llow r*mot* *tt**k*rs to inj**t *r*itr*ry w** s*ript or *TML vi* t** (*) tim* p*r*m*t*r to **l*.jsp *n* (*) *ny inv*li* p*r*m*t*r, w*i** **us*s *n XSS w**n t** lo* *il* is vi

Reasoning

T** vuln*r**ility m*ni**sts w**n: *) *tt**k*rs inj**t XSS p*ylo**s vi* p*r*m*t*rs (lik* 'tim*' in `**l*.jsp`) *) S*rv*r lo*s stor* un*s**p** p*ylo**s *) **min vi*ws lo*s t*rou** *onsol* `JSP`s t**t ori*in*lly r*n**r** *ont*nt wit*out *s**pin*. T** p*