lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20070315145745.1802.qmail@securityfocus.com>
Date: 15 Mar 2007 14:57:45 -0000
From: james@...rkee.co.uk
To: bugtraq@...urityfocus.com
Subject: IBM Rational ClearQuest Web - Cross Site Scripting

	..........MMMMMMMM.      ..... .      ..
	........7MMMMMMMMMM  . .......... .  ...
	........OMMMMMMMMMM.....................
	........8MMNMMMMMMMMMMMMMN..............
	........NMMMMMMMMMMMMMNNNND.............
	....,DNMMMMMMMMMMMMMMMNDDD..............
	...DNNNNDMMMMMMMMMMMMMMNI...............
	...D8DDNN7MNNMMMMMMMMMMM................
	.....D8DN8NMMMMMMMMMMMMMMI..............
	........8MMMNMMMMMMMMMMMMMM.............
	...........MMMMMMMMMMMMMMMMMMM..........
	........MMMMMMMMMMMMMMMMMMMMMMMM........
	.......MMMMMMMMMMMMMMMMMMMMMMMMMM.......
	......MMMMMMMMMMMMMMMMMMMMMMMMMMMM,.....
	.....MMMMMMMMMMMMMMMMMMMMMMMMMMMMM,.....
	.....MMMMMMMMMMMMMMMMMMMMMMMMMMMMMM.....
	....MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM.....
	....MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM ....
	...MMMMMMMMMMMMMMMMMMMMMMMMMMMMNMMM. ...
	...MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM:....
	...MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMD....
	...MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMN....
________________________________________________________________________

Vendor: IBM / http://www.ibm.com
Affected Products: Rational ClearQuest Web / Version 7.0.0.0
Vulnerability: Cross Site Scripting
Risk: HIGH

________________________________________________________________________

Vendor communication: None.
________________________________________________________________________

Overview:
Rational ClearQuest provides flexible workflow management, defect and 
change tracking across the application life cycle for better insight, 
predictability and control.

Description:
The flaw was found while logging a defect for another application, only
to find out Cq was also vulnerable.

Whilst logging a defect, upload a txt file as an attachment to the
defect.  Put whatever <script></script> you wish into the txt file and
it will execute when another user tries to open the attachment.
This could lead to session details (cqwebsession, JSESSIONID etc) being
disclosed to a third party and used to hijack the users session.
Finally, the Cross Site Scripting vulnerability also affects the summary
page, which is PHProjekt's index page.

________________________________________________________________________

Credit:
Flaw found by James Clarke / clark0r / 15.03.2007
http://www.clarkee.co.uk
________________________________________________________________________

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ