[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20070315145745.1802.qmail@securityfocus.com>
Date: 15 Mar 2007 14:57:45 -0000
From: james@...rkee.co.uk
To: bugtraq@...urityfocus.com
Subject: IBM Rational ClearQuest Web - Cross Site Scripting
..........MMMMMMMM. ..... . ..
........7MMMMMMMMMM . .......... . ...
........OMMMMMMMMMM.....................
........8MMNMMMMMMMMMMMMMN..............
........NMMMMMMMMMMMMMNNNND.............
....,DNMMMMMMMMMMMMMMMNDDD..............
...DNNNNDMMMMMMMMMMMMMMNI...............
...D8DDNN7MNNMMMMMMMMMMM................
.....D8DN8NMMMMMMMMMMMMMMI..............
........8MMMNMMMMMMMMMMMMMM.............
...........MMMMMMMMMMMMMMMMMMM..........
........MMMMMMMMMMMMMMMMMMMMMMMM........
.......MMMMMMMMMMMMMMMMMMMMMMMMMM.......
......MMMMMMMMMMMMMMMMMMMMMMMMMMMM,.....
.....MMMMMMMMMMMMMMMMMMMMMMMMMMMMM,.....
.....MMMMMMMMMMMMMMMMMMMMMMMMMMMMMM.....
....MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM.....
....MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM ....
...MMMMMMMMMMMMMMMMMMMMMMMMMMMMNMMM. ...
...MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM:....
...MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMD....
...MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMN....
________________________________________________________________________
Vendor: IBM / http://www.ibm.com
Affected Products: Rational ClearQuest Web / Version 7.0.0.0
Vulnerability: Cross Site Scripting
Risk: HIGH
________________________________________________________________________
Vendor communication: None.
________________________________________________________________________
Overview:
Rational ClearQuest provides flexible workflow management, defect and
change tracking across the application life cycle for better insight,
predictability and control.
Description:
The flaw was found while logging a defect for another application, only
to find out Cq was also vulnerable.
Whilst logging a defect, upload a txt file as an attachment to the
defect. Put whatever <script></script> you wish into the txt file and
it will execute when another user tries to open the attachment.
This could lead to session details (cqwebsession, JSESSIONID etc) being
disclosed to a third party and used to hijack the users session.
Finally, the Cross Site Scripting vulnerability also affects the summary
page, which is PHProjekt's index page.
________________________________________________________________________
Credit:
Flaw found by James Clarke / clark0r / 15.03.2007
http://www.clarkee.co.uk
________________________________________________________________________
Powered by blists - more mailing lists