lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 8 Sep 2014 15:28:23 GMT
From: main@...cnamara.com
To: bugtraq@...urityfocus.com
Subject: IBM WebSphere Application Server (WAS) Integrated Solutions
 Console Login Page username Parameter Reflected XSS Security Vulnerability

INFO:
Class:	Input Validation Error
CVE:	
Remote:	Yes
Local:	No
Published:	Aug 27 2014 12:00AM
Updated:	Aug 27 2014 12:00AM
Credit:	G. S. McNamara, CGI Federal Emerging Technologies Security Practice (ETSP)
Vulnerable: IBM WebSphere Application Server (WAS) Integrated Solutions Console 7.0.0.19

DISCUSSION:
IBM WebSphere Application Server (WAS) contains a flaw that allows a reflected cross-site scripting (XSS) attack. This flaw exists because the login page of the Integrated Solutions Console does not validate input to the 'username' parameter before returning it to users. This may allow a remote attacker to create a specially crafted request that would execute arbitrary script code in the 'Welcome [username]' message at the top of the dashboard page upon logging in.

The finding exists in a version that was released after this class of vulnerability was patched by IBM, and so is newer than a recommended version by IBM to upgrade to for protection from this particular class of vulnerability. Subsequent releases may protect against this issue.

REFERENCES:
http://osvdb.org/show/osvdb/110592
http://maverickblogging.com/disclosed-xss-vulnerability-in-ibm-websphere-application-server-integrated-solutions-console/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ