XSS (Cross-site Scripting) allows an attacker to execute a dynamic script (Javascript, VbScript) in the context of the application. This allows several different attack opportunities, mostly hijacking the current session of the user or changing the look of the page by changing the HTML on the fly to steal the user's credentials. This happens because the input entered by a user has been interpreted as HTML/Javascript/VbScript by the browser.
XSS targets the users of the application instead of the server. Although this is a limitation, since it allows attackers to hijack other users' session, an attacker might attack an administrator to gain full control over the application.
Impact
There are many different attacks that can be leveraged through the use of XSS, including:
Hi-jacking users' active session
Changing the look of the page within the victims browser.
Mounting a successful phishing attack.
Intercept data and perform man-in-the-middle attacks.
Remedy
The issue occurs because the browser interprets the input as active HTML, Javascript or VbScript. To avoid this, all input and output from the application should be filtered. Output should be filtered according to the output format and location. Typically the output location is HTML. Where the output is HTML ensure that all active content is removed prior to its presentation to the server.
Prior to sanitizing user input, ensure you have a pre-defined list of both expected and acceptable characters with which you populate a white-list. This list needs only be defined once and should be used to sanitize and validate all subsequent input.
There are a number of pre-defined, well structured white-list libraries available for many different environments, good examples of these include, OWASP Reform and Microsoft Anti Cross-site Scripting libraries are good examples.
Netsparker identified a web page that discloses server side source code. An attacker can obtain the source code of the web application, which can contain sensitive data such as "database connection strings", "username" and "password". Operational and technical logic of the application can also be revealed.
Impact
Depending on the nature of the source code disclosed an attacker can mount one or more of the following types of attacks:
Access the database or other data resources. With the privileges of the account obtained attempt to read, update or delete arbitrary data from the database.
Access password protected administrative mechanisms such as "dashboard", "management console" and "admin panel" potentially leading to full control of the application.
Develop further attacks by investigating the source code for input validation errors and logic vulnerabilities.
Actions to Take
Confirm exactly what aspects of the source code is actually disclosed; due limitations of these types of vulnerability it might not be possible to confirm this in all instances. Confirm this is not intended functionality.
If it is a file required by the application, change its permissions to prevent public users from accessing it. If it is not, then remove it from the web server.
Ensure that the server has all the current security patches applied.
Remove all temporary and backup files from the web server.
Required Skills for Successful Exploitation
This is dependent on the information obtained from source code. Uncovering these forms of vulnerabilities does not require high levels of skills. However a highly skilled attacker could leverage this form of vulnerability to obtain account information for databases or administrative panels, ultimately leading to control of the application.
/* * FCKeditor - The text editor for Internet - http://www.fckeditor.net * Copyright (C) 2003-2009 Frederico Caldeira Knabben * * == BEGIN LICENSE == * * Licensed under the terms of any of the following licenses at your * choice: * * - GNU General Public License Version 2 or later (the "GPL") * http://www.gnu.org/licenses/gpl.html * * - GNU Lesser General Public License Version 2.1 or later (the "LGPL") * http://www.gnu.org/licenses/lgpl.html * * - Mozilla Public License Version 1.1 or later (the "MPL") * http://www.mozilla.org/MPL/MPL-1.1.html * * == END LICENSE == * * Editor configuration settings. * * Follow this link for more information: * http://docs.fckeditor.net/FCKeditor_2.x/Developers_Guide/Configuration/Configuration_Options */
// The option switches between trying to keep the html structure or do the changes so the content looks like it was in Word FCKConfig.CleanWordKeepsStructure = false ;
// Only inline elements are valid. FCKConfig.RemoveFormatTags = 'b,big,code,del,dfn,em,font,i,ins,kbd,q,samp,small,span,strike,strong,sub,sup,tt,u,var' ;
// Attributes that will be removed FCKConfig.RemoveAttributes = 'class,style,lang,width,height,align,hspace,valign' ;
// The distance of an indentation step. FCKConfig.IndentLength = 40 ; FCKConfig.IndentUnit = 'px' ;
// Alternatively, FCKeditor allows the use of CSS classes for block indentation. // This overrides the IndentLength/IndentUnit settings. FCKConfig.IndentClasses = [] ;
// The following value defines which File Browser connector and Quick Upload // "uploader" to use. It is valid for the default implementaion and it is here // just to make this configuration file cleaner. // It is not possible to change this value using an external file or even // inline when creating the editor instance. In that cases you must set the // values of LinkBrowserURL, ImageBrowserURL and so on. // Custom implementations should just ignore it. var _FileBrowserLanguage = 'cfm' ; // asp | aspx | cfm | lasso | perl | php | py var _QuickUploadLanguage = 'cfm' ; // asp | aspx | cfm | lasso | perl | php | py
// Don't care about the following two lines. It just calculates the correct connector // extension to use for the default File Browser (Perl uses "cgi"). var _FileBrowserExtension = _FileBrowserLanguage == 'perl' ? 'cgi' : _FileBrowserLanguage ; var _QuickUploadExtension = _QuickUploadLanguage == 'perl' ? 'cgi' : _QuickUploadLanguage ;
Netsparker identified a web page that discloses server side source code. An attacker can obtain server side source code of web application, which can contain sensitive data such as database connection strings, usernames and passwords along with the technical and business logic of the application.
Impact
Depending on the nature of the source code disclosed an attacker can mount one or more of the following types of attacks:
Access the database or other data resources. With the privileges of the account obtained attempt to read, update or delete arbitrary data from the database.
Access password protected administrative mechanisms such as "dashboard", "management console" and "admin panel" potentially leading to gull control of the application.
Develop further attacks by investigating the source code for input validation errors and logic vulnerabilities.
Actions to Take
Confirm exactly what aspects of the source code is actually disclosed; due limitations of these types of vulnerability it might not be possible to confirm this in all instances. Confirm this is not intended functionality.
If it is a file required by the application, change its permissions to prevent public users from accessing it. If it is not, then remove it from the web server
Ensure that the server has all the current security patches applied.
Remove all temporary and backup files from the web server.
Required Skills for Successful Exploitation
This is dependent on the information obtained from source code. Uncovering these forms of vulnerabilities does not require high levels of skills. However a highly skilled attacker could leverage this form of vulnerability to obtain account information for databases or administrative panels, ultimately leading to control of the application or even the host the application reside on.
/* * FCKeditor - The text editor for Internet - http://www.fckeditor.net * Copyright (C) 2003-2009 Frederico Caldeira Knabben * * == BEGIN LICENSE == * * Licensed under the terms of any of the following licenses at your * choice: * * - GNU General Public License Version 2 or later (the "GPL") * http://www.gnu.org/licenses/gpl.html * * - GNU Lesser General Public License Version 2.1 or later (the "LGPL") * http://www.gnu.org/licenses/lgpl.html * * - Mozilla Public License Version 1.1 or later (the "MPL") * http://www.mozilla.org/MPL/MPL-1.1.html * * == END LICENSE == * * Editor configuration settings. * * Follow this link for more information: * http://docs.fckeditor.net/FCKeditor_2.x/Developers_Guide/Configuration/Configuration_Options */
// The option switches between trying to keep the html structure or do the changes so the content looks like it was in Word FCKConfig.CleanWordKeepsStructure = false ;
// Only inline elements are valid. FCKConfig.RemoveFormatTags = 'b,big,code,del,dfn,em,font,i,ins,kbd,q,samp,small,span,strike,strong,sub,sup,tt,u,var' ;
// Attributes that will be removed FCKConfig.RemoveAttributes = 'class,style,lang,width,height,align,hspace,valign' ;
// The distance of an indentation step. FCKConfig.IndentLength = 40 ; FCKConfig.IndentUnit = 'px' ;
// Alternatively, FCKeditor allows the use of CSS classes for block indentation. // This overrides the IndentLength/IndentUnit settings. FCKConfig.IndentClasses = [] ;
// The following value defines which File Browser connector and Quick Upload // "uploader" to use. It is valid for the default implementaion and it is here // just to make this configuration file cleaner. // It is not possible to change this value using an external file or even // inline when creating the editor instance. In that cases you must set the // values of LinkBrowserURL, ImageBrowserURL and so on. // Custom implementations should just ignore it. var _FileBrowserLanguage = 'cfm' ; // asp | aspx | cfm | lasso | perl | php | py var _QuickUploadLanguage = 'cfm' ; // asp | aspx | cfm | lasso | perl | php | py
// Don't care about the following two lines. It just calculates the correct connector // extension to use for the default File Browser (Perl uses "cgi"). var _FileBrowserExtension = _FileBrowserLanguage == 'perl' ? 'cgi' : _FileBrowserLanguage ; var _QuickUploadExtension = _QuickUploadLanguage == 'perl' ? 'cgi' : _QuickUploadLanguage ;
The Server responded with an HTTP status 500. This indicates that there is a server-side error. Reasons may vary. The behavior should be analysed carefully. If Netsparker is able to find a security issue in the same resource it will report this as a separate vulnerability.
Impact
The impact may vary depending on the condition. Generally this indicates poor coding practices, not enough error checking, sanitization and whitelisting. However there might be a bigger issue such as SQL Injection. If that's the case Netsparker will check for other possible issues and report them separately.
Remedy
Analyse this issue and review the application code in order to handle unexpected errors, this should be a generic practice which does not disclose further information upon an error. All errors should be handled server side only.
<font style="COLOR: black; FONT: 16pt/18pt verdana"> The web site you are accessing has experienced an unexpected error.<br> Please contact the website administrator.
</font> <br><br> <table border="1" cellpadding="3" bordercolor="#000808" bgcolor="#e7e7e7"> <tr> <td bgcolor="#000066"> <font style="COLOR: white; FONT: 11pt/13pt verdana" color="white"> The following information is meant for the website developer for debugging purposes. </font> </td> <tr> <tr> <td bgcolor="#4646EE"> <font style="COLOR: white; FONT: 11pt/13pt verdana" color="white"> Error Occurred While Processing Request </font> </td> </tr> <tr> <td> <font style="COLOR: black; FONT: 8pt/11pt verdana">
<table width="500" cellpadding="0" cellspacing="0" border="0"> <tr> <td id="tableProps2" align="left" valign="middle" width="500"> <h1 id="textSection1" style="COLOR: black; FONT: 13pt/15pt verdana"> The required parameter attributes.instanceName was not provided. </h1> </td> </tr> <tr> <td id="tablePropsWidth" width="400" colspan="2"> <font style="COLOR: black; FONT: 8pt/11pt verdana"> This page uses the cfparam tag to declare the parameter attributes.instanceName as required for this template. The parameter is not available. Ensure that you have passed or initialized the parameter correctly. To set a default value for the parameter, use the default attribute of the cfparam tag. </font> </td> </tr> <tr> <td height> </td> </tr>
<li>Check the <a href='http://www.adobe.com/go/prod_doc' target="new">ColdFusion documentation</a> to verify that you are using the correct syntax.</li> <li>Search the <a href='http://www.adobe.com/go/prod_support/' target="new">Knowledge Base</a> to find a solution to your problem.</li>
<a href="javascript:;" onMouseOver="window.status='Click to expand stack trace';return true;" onMouseOut="window.status='';return true;" onClick="showHide('cf_stacktrace');return true;">Stack Trace (click to expand)</a>
</td> </tr> <tr> <td id="cf_stacktrace" style="display:none"> <font style="COLOR: black; FONT: 8pt/11pt verdana"> at cffckeditor2ecfm446309379.runPage(/var/www/CFIDE/scripts/ajax/FCKeditor/fckeditor.cfm:40) <br /> <br /> <pre>coldfusion.runtime.CfJspPage$ParameterNotFoundException: The required parameter attributes.instanceName was not provided. at coldfusion.runtime.CfJspPage._checkParam(CfJspPage.java:2960) at coldfusion.tagext.lang.ParamTag.doStartTag(ParamTag.java:138) at coldfusion.runtime.CfJspPage._emptyTcfTag(CfJspPage.java:2722) at cffckeditor2ecfm446309379.runPage(/var/www/CFIDE/scripts/ajax/FCKeditor/fckeditor.cfm:40) at coldfusion.runtime.CfJspPage.invoke(CfJspPage.java:231) at coldfusion.tagext.lang.IncludeTag.doStartTag(IncludeTag.java:416) at coldfusion.filter.CfincludeFilter.invoke(CfincludeFilter.java:65) at coldfusion.filter.ApplicationFilter.invoke(ApplicationFilter.java:381) at coldfusion.filter.RequestMonitorFilter.invoke(RequestMonitorFilter.java:48) at coldfusion.filter.MonitoringFilter.invoke(MonitoringFilter.java:40) at coldfusion.filter.PathFilter.invoke(PathFilter.java:94) at coldfusion.filter.ExceptionFilter.invoke(ExceptionFilter.java:70) at coldfusion.filter.BrowserDebugFilter.invoke(BrowserDebugFilter.java:79) at coldfusion.filter.ClientScopePersistenceFilter.invoke(ClientScopePersistenceFilter.java:28) at coldfusion.filter.BrowserFilter.invoke(BrowserFilter.java:38) at coldfusion.filter.NoCacheFilter.invoke(NoCacheFilter.java:46) at coldfusion.filter.GlobalsFilter.invoke(GlobalsFilter.java:38) at coldfusion.filter.DatasourceFilter.invoke(DatasourceFilter.java:22) at coldfusion.filter.CachingFilter.invoke(CachingFilter.java:62) at coldfusion.CfmServlet.service(CfmServlet.java:200) at coldfusion.bootstrap.BootstrapServlet.service(BootstrapServlet.java:89) at jrun.servlet.FilterChain.doFilter(FilterChain.java:86) at coldfusion.monitor.event.MonitoringServletFilter.doFilter(MonitoringServletFilter.java:42) at coldfusion.bootstrap.BootstrapFilter.doFilter(BootstrapFilter.java:46) at jrun.servlet.FilterChain.doFilter(FilterChain.java:94) at jrun.servlet.FilterChain.service(FilterChain.java:101) at jrun.servlet.ServletInvoker.invoke(ServletInvoker.java:106) at jrun.servlet.JRunInvokerChain.invokeNext(JRunInvokerChain.java:42) at jrun.servlet.JRunRequestDispatcher.invoke(JRunRequestDispatcher.java:286) at jrun.servlet.ServletEngineService.dispatch(ServletEngineService.java:543) at jrun.servlet.jrpp.JRunProxyService.invokeRunnable(JRunProxyService.java:203) at jrunx.scheduler.ThreadPool$DownstreamMetrics.invokeRunnable(ThreadPool.java:320) at jrunx.scheduler.ThreadPool$ThreadThrottle.invokeRunnable(ThreadPool.java:428) at jrunx.scheduler.ThreadPool$UpstreamMetrics.invokeRunnable(ThreadPool.java:266) at jrunx.scheduler.WorkerThread.run(WorkerThread.java:66)</pre></td> </tr> </table>
"Auto Complete" was enabled in one or more of the form fields. These were either "password" fields or important fields such as "Credit Card".
Impact
Data entered in these fields will be cached by the browser. An attacker who can access the victim's browser could steal this information. This is especially important if the application is commonly used in shared computers such as cyber cafes or airport terminals.
Remedy
Add the attribute autocomplete="off" to the form tag or to individual "input" fields.
Actions to Take
See the remedy for the solution.
Find all instances of inputs which store private data and disable autocomplete. Fields which contain data such as "Credit Card" or "CCV" type data should not be cached. You can allow the application to cache usernames and remember passwords, however, in most cases this is not recommended.
Re-scan the application after addressing the identified issues to ensure that all of the fixes have been applied properly.
Required Skills for Successful Exploitation
Dumping all data from a browser can be fairly easy and there exist a number of automated tools to undertake this. Where the attacker cannot dump the data, he/she could still browse the recently visited websites and activate the auto-complete feature to see previously entered values.
Cookie was not marked as HTTPOnly. HTTPOnly cookies can not be read by client-side scripts therefore marking a cookie as HTTPOnly can provide an additional layer of protection against Cross-site Scripting attacks..
Impact
During a Cross-site Scripting attack an attacker might easily access cookies and hijack the victim's session.
Actions to Take
See the remedy for solution
Consider marking all of the cookies used by the application as HTTPOnly (After these changes javascript code will not able to read cookies.
Remedy
Mark the cookie as HTTPOnly. This will be an extra layer of defence against XSS. However this is not a silver bullet and will not protect the system against Cross-site Scripting attacks. An attacker can use a tool such as XSS Tunnel to bypass HTTPOnly protection.
Netsparker discovered an internal IP address in the page. It was not determined if the IP address was that of the system itself or that of an internal network.
Impact
This kind of information can be useful for an attacker when combined with other vulnerabilities.
Remedy
First ensure that this is not a false positive. Due to the nature of the issue. Netsparker could not confirm that this IP address was actually the real internal IP address of the target web server or internal network. If it is then consider removing it.
<font style="COLOR: black; FONT: 16pt/18pt verdana"> The web site you are accessing has experienced an unexpected error.<br> Please contact the website administrator.
</font> <br><br> <table border="1" cellpadding="3" bordercolor="#000808" bgcolor="#e7e7e7"> <tr> <td bgcolor="#000066"> <font style="COLOR: white; FONT: 11pt/13pt verdana" color="white"> The following information is meant for the website developer for debugging purposes. </font> </td> <tr> <tr> <td bgcolor="#4646EE"> <font style="COLOR: white; FONT: 11pt/13pt verdana" color="white"> Error Occurred While Processing Request </font> </td> </tr> <tr> <td> <font style="COLOR: black; FONT: 8pt/11pt verdana">
<table width="500" cellpadding="0" cellspacing="0" border="0"> <tr> <td id="tableProps2" align="left" valign="middle" width="500"> <h1 id="textSection1" style="COLOR: black; FONT: 13pt/15pt verdana"> The required parameter attributes.instanceName was not provided. </h1> </td> </tr> <tr> <td id="tablePropsWidth" width="400" colspan="2"> <font style="COLOR: black; FONT: 8pt/11pt verdana"> This page uses the cfparam tag to declare the parameter attributes.instanceName as required for this template. The parameter is not available. Ensure that you have passed or initialized the parameter correctly. To set a default value for the parameter, use the default attribute of the cfparam tag. </font> </td> </tr> <tr> <td height> </td> </tr>
<li>Check the <a href='http://www.adobe.com/go/prod_doc' target="new">ColdFusion documentation</a> to verify that you are using the correct syntax.</li> <li>Search the <a href='http://www.adobe.com/go/prod_support/' target="new">Knowledge Base</a> to find a solution to your problem.</li>
<a href="javascript:;" onMouseOver="window.status='Click to expand stack trace';return true;" onMouseOut="window.status='';return true;" onClick="showHide('cf_stacktrace');return true;">Stack Trace (click to expand)</a>
</td> </tr> <tr> <td id="cf_stacktrace" style="display:none"> <font style="COLOR: black; FONT: 8pt/11pt verdana"> at cffckeditor2ecfm446309379.runPage(/var/www/CFIDE/scripts/ajax/FCKeditor/fckeditor.cfm:40) <br /> <br /> <pre>coldfusion.runtime.CfJspPage$ParameterNotFoundException: The required parameter attributes.instanceName was not provided. at coldfusion.runtime.CfJspPage._checkParam(CfJspPage.java:2960) at coldfusion.tagext.lang.ParamTag.doStartTag(ParamTag.java:138) at coldfusion.runtime.CfJspPage._emptyTcfTag(CfJspPage.java:2722) at cffckeditor2ecfm446309379.runPage(/var/www/CFIDE/scripts/ajax/FCKeditor/fckeditor.cfm:40) at coldfusion.runtime.CfJspPage.invoke(CfJspPage.java:231) at coldfusion.tagext.lang.IncludeTag.doStartTag(IncludeTag.java:416) at coldfusion.filter.CfincludeFilter.invoke(CfincludeFilter.java:65) at coldfusion.filter.ApplicationFilter.invoke(ApplicationFilter.java:381) at coldfusion.filter.RequestMonitorFilter.invoke(RequestMonitorFilter.java:48) at coldfusion.filter.MonitoringFilter.invoke(MonitoringFilter.java:40) at coldfusion.filter.PathFilter.invoke(PathFilter.java:94) at coldfusion.filter.ExceptionFilter.invoke(ExceptionFilter.java:70) at coldfusion.filter.BrowserDebugFilter.invoke(BrowserDebugFilter.java:79) at coldfusion.filter.ClientScopePersistenceFilter.invoke(ClientScopePersistenceFilter.java:28) at coldfusion.filter.BrowserFilter.invoke(BrowserFilter.java:38) at coldfusion.filter.NoCacheFilter.invoke(NoCacheFilter.java:46) at coldfusion.filter.GlobalsFilter.invoke(GlobalsFilter.java:38) at coldfusion.filter.DatasourceFilter.invoke(DatasourceFilter.java:22) at coldfusion.filter.CachingFilter.invoke(CachingFilter.java:62) at coldfusion.CfmServlet.service(CfmServlet.java:200) at coldfusion.bootstrap.BootstrapServlet.service(BootstrapServlet.java:89) at jrun.servlet.FilterChain.doFilter(FilterChain.java:86) at coldfusion.monitor.event.MonitoringServletFilter.doFilter(MonitoringServletFilter.java:42) at coldfusion.bootstrap.BootstrapFilter.doFilter(BootstrapFilter.java:46) at jrun.servlet.FilterChain.doFilter(FilterChain.java:94) at jrun.servlet.FilterChain.service(FilterChain.java:101) at jrun.servlet.ServletInvoker.invoke(ServletInvoker.java:106) at jrun.servlet.JRunInvokerChain.invokeNext(JRunInvokerChain.java:42) at jrun.servlet.JRunRequestDispatcher.invoke(JRunRequestDispatcher.java:286) at jrun.servlet.ServletEngineService.dispatch(ServletEngineService.java:543) at jrun.servlet.jrpp.JRunProxyService.invokeRunnable(JRunProxyService.java:203) at jrunx.scheduler.ThreadPool$DownstreamMetrics.invokeRunnable(ThreadPool.java:320) at jrunx.scheduler.ThreadPool$ThreadThrottle.invokeRunnable(ThreadPool.java:428) at jrunx.scheduler.ThreadPool$UpstreamMetrics.invokeRunnable(ThreadPool.java:266) at jrunx.scheduler.WorkerThread.run(WorkerThread.java:66)</pre></td> </tr> </table>
Netsparker found e-mail addresses on the web site.
Impact
E-mail addresses discovered within the application can be used by both spam email engines and also brute force tools. Furthermore valid email addresses may lead to social engineering attacks .
Remedy
Use generic email addresses such as contact@ or info@ for general communications, remove user/people specific e-mail addresses from the web site, should this be required use submission forms for this purpose.
Netsparker identified that the response from the page returned an HTTP Redirect Status but output more information than usual. This generally indicates that after redirect, page did not finish the response as it was supposed to.
Impact
This can lead serious issues such authentication bypass in authentication required pages, in other pages it generally indicates a programming error.
Remedy
Finish the HTTP Response after you redirect the user.
In ASP.NET use Response.Redirect("redirected-page.aspx", true); instead of Response.Redirect("redirected-page.aspx", false);
In PHP applications call exit(); after you redirect the user.
// Toggle the target (everething below the header row). // First two rows are XMLComment and XMLRoot - they are part // of the long dump, the rest are direct children - part of the // short dump if(document.all) { var table = source.parentElement.parentElement ; for ( var i = 1; i < table.rows.length; i++ ) { target = table.rows[i] ; if ( i < 3 ) cfdump_toggleTarget( target, switchLongToState ) ; else cfdump_toggleTarget( target, switchShortToState ) ; } } else { var table = source.parentNode.parentNode ; var row = 1; for ( var i = 1; i < table.childNodes.length; i++ ) { target = table.childNodes[i] ; if( target.style ) { if ( row < 3 ) { cfdump_toggleTarget( target, switchLongToState ) ; } else { cfdump_toggleTarget( target, switchShortToState ) ; } row++; } } } }
cfdump_toggleTable = function(source) {
var switchToState = cfdump_toggleSource( source ) ; if(document.all) { var table = source.parentElement.parentElement ; for ( var i = 1; i < table.rows.length; i++ ) { target = table.rows[i] ; cfdump_toggleTarget( target, switchToState ) ; } } else { var table = source.parentNode.parentNode ; for ( var i = 1; i < table.childNodes.length; i++ ) { target = table.childNodes[i] ; if(target.style) { cfdump_toggleTarget( target, switchToState ) ; } } } }
<font style="COLOR: black; FONT: 16pt/18pt verdana"> The web site you are accessing has experienced an unexpected error.<br> Please contact the website administrator.
</font> <br><br> <table border="1" cellpadding="3" bordercolor="#000808" bgcolor="#e7e7e7"> <tr> <td bgcolor="#000066"> <font style="COLOR: white; FONT: 11pt/13pt verdana" color="white"> The following information is meant for the website developer for debugging purposes. </font> </td> <tr> <tr> <td bgcolor="#4646EE"> <font style="COLOR: white; FONT: 11pt/13pt verdana" color="white"> Error Occurred While Processing Request </font> </td> </tr> <tr> <td> <font style="COLOR: black; FONT: 8pt/11pt verdana">
<table width="500" cellpadding="0" cellspacing="0" border="0"> <tr> <td id="tableProps2" align="left" valign="middle" width="500"> <h1 id="textSection1" style="COLOR: black; FONT: 13pt/15pt verdana"> The required parameter attributes.instanceName was not provided. </h1> </td> </tr> <tr> <td id="tablePropsWidth" width="400" colspan="2"> <font style="COLOR: black; FONT: 8pt/11pt verdana"> This page uses the cfparam tag to declare the parameter attributes.instanceName as required for this template. The parameter is not available. Ensure that you have passed or initialized the parameter correctly. To set a default value for the parameter, use the default attribute of the cfparam tag. </font> </td> </tr> <tr> <td height> </td> </tr>
<li>Check the <a href='http://www.adobe.com/go/prod_doc' target="new">ColdFusion documentation</a> to verify that you are using the correct syntax.</li> <li>Search the <a href='http://www.adobe.com/go/prod_support/' target="new">Knowledge Base</a> to find a solution to your problem.</li>
<a href="javascript:;" onMouseOver="window.status='Click to expand stack trace';return true;" onMouseOut="window.status='';return true;" onClick="showHide('cf_stacktrace');return true;">Stack Trace (click to expand)</a>
</td> </tr> <tr> <td id="cf_stacktrace" style="display:none"> <font style="COLOR: black; FONT: 8pt/11pt verdana"> at cffckeditor2ecfm446309379.runPage(/var/www/CFIDE/scripts/ajax/FCKeditor/fckeditor.cfm:40) <br /> <br /> <pre>coldfusion.runtime.CfJspPage$ParameterNotFoundException: The required parameter attributes.instanceName was not provided. at coldfusion.runtime.CfJspPage._checkParam(CfJspPage.java:2960) at coldfusion.tagext.lang.ParamTag.doStartTag(ParamTag.java:138) at coldfusion.runtime.CfJspPage._emptyTcfTag(CfJspPage.java:2722) at cffckeditor2ecfm446309379.runPage(/var/www/CFIDE/scripts/ajax/FCKeditor/fckeditor.cfm:40) at coldfusion.runtime.CfJspPage.invoke(CfJspPage.java:231) at coldfusion.tagext.lang.IncludeTag.doStartTag(IncludeTag.java:416) at coldfusion.filter.CfincludeFilter.invoke(CfincludeFilter.java:65) at coldfusion.filter.ApplicationFilter.invoke(ApplicationFilter.java:381) at coldfusion.filter.RequestMonitorFilter.invoke(RequestMonitorFilter.java:48) at coldfusion.filter.MonitoringFilter.invoke(MonitoringFilter.java:40) at coldfusion.filter.PathFilter.invoke(PathFilter.java:94) at coldfusion.filter.ExceptionFilter.invoke(ExceptionFilter.java:70) at coldfusion.filter.BrowserDebugFilter.invoke(BrowserDebugFilter.java:79) at coldfusion.filter.ClientScopePersistenceFilter.invoke(ClientScopePersistenceFilter.java:28) at coldfusion.filter.BrowserFilter.invoke(BrowserFilter.java:38) at coldfusion.filter.NoCacheFilter.invoke(NoCacheFilter.java:46) at coldfusion.filter.GlobalsFilter.invoke(GlobalsFilter.java:38) at coldfusion.filter.DatasourceFilter.invoke(DatasourceFilter.java:22) at coldfusion.filter.CachingFilter.invoke(CachingFilter.java:62) at coldfusion.CfmServlet.service(CfmServlet.java:200) at coldfusion.bootstrap.BootstrapServlet.service(BootstrapServlet.java:89) at jrun.servlet.FilterChain.doFilter(FilterChain.java:86) at coldfusion.monitor.event.MonitoringServletFilter.doFilter(MonitoringServletFilter.java:42) at coldfusion.bootstrap.BootstrapFilter.doFilter(BootstrapFilter.java:46) at jrun.servlet.FilterChain.doFilter(FilterChain.java:94) at jrun.servlet.FilterChain.service(FilterChain.java:101) at jrun.servlet.ServletInvoker.invoke(ServletInvoker.java:106) at jrun.servlet.JRunInvokerChain.invokeNext(JRunInvokerChain.java:42) at jrun.servlet.JRunRequestDispatcher.invoke(JRunRequestDispatcher.java:286) at jrun.servlet.ServletEngineService.dispatch(ServletEngineService.java:543) at jrun.servlet.jrpp.JRunProxyService.invokeRunnable(JRunProxyService.java:203) at jrunx.scheduler.ThreadPool$DownstreamMetrics.invokeRunnable(ThreadPool.java:320) at jrunx.scheduler.ThreadPool$ThreadThrottle.invokeRunnable(ThreadPool.java:428) at jrunx.scheduler.ThreadPool$UpstreamMetrics.invokeRunnable(ThreadPool.java:266) at jrunx.scheduler.WorkerThread.run(WorkerThread.java:66)</pre></td> </tr> </table>