[<prev] [next>] [day] [month] [year] [list]
Message-ID: <408E44BC9EB1A74DB458543F5BCDA35A74AE63@gandalf.Hacktics.local>
Date: Thu, 25 Feb 2010 15:04:33 +0200
From: "Ofer Maor" <ofer@...ktics.com>
To: <full-disclosure@...ts.grok.org.uk>
Subject: Hacktics Advisory Feb10: XSS in IBM WebSphere
Portal & Lotus WCM
Hacktics Research Group Security Advisory
http://www.hacktics.com/#view=Resources%7CAdvisory
By Oren Hafif, Hacktics.
24-Feb-2010
===========
I. Overview
===========
During a penetration test performed by Hacktics' experts, certain
vulnerabilities were identified in an IBM Websphere Portal Server and
Lotus Web Content Management deployment. Further research has identified
that the login page of the IBM Lotus Workplace Web Content Management is
vulnerable to Reflected Cross Site Scripting attacks.
A friendly formatted version of this advisory is available in:
http://www.hacktics.com/content/advisories/AdvIBM20100224.html
===============
II. The Finding
===============
An attacker can inject script into a URL pointing at the vulnerable
page, and attack system users by sending it to them. Users, who follow
the link, will be attacked with the injected script.
============
III. Details
============
The login page takes the query string from the request URL and embeds it
into the HTML response as the value of a form field named success. The
attack is done by escaping the field (">), followed by the relevant
script, as seen in the following URL:
http://[host]:[port]/wps/wcm/webinterface/login/login.jsp?"><script>mali
cious_script</script><b%20"
Note: The content of this parameter is used as part of a page
redirection performed after the login. Even without XSS exploitation,
this can be used for invalidated redirection.
===========
IV. Exploit
===========
The exploit is performed by replacing malicious_script with the relevant
javascript payload. An evasion for simple XSS signature protection
(where applicable), can allow executing the same script without using
HTML tags, as seen in the following sample:
http://[host]:[port]/wps/wcm/webinterface/login/login.jsp?"
style="tr:expression(malicious_script)
=============================
V. Vendor's Response/Solution
=============================
IBM has released a patch for this vulnerability, as well as a proposed
workaround. For additional details please refer to:
http://www-01.ibm.com/support/docview.wss?uid=swg21421469
====================
VI. Affected Systems
====================
WebSphere Portal, Lotus Web Content Management and Workspace Web Content
Management versions:
6.1.0.0, 6.1.0.1, 6.1.0.2, 6.1.0.3, 6.1.5.0
6.0.1.0, 6.1.0.2, 6.1.0.3, 6.1.0.4, 6.1.0.5, 6.1.0.6, 6.1.0.7
6.0.0.0, 6.0.0.1, 6.0.0.2, 6.0.0.3, 6.0.0.4
5.1.0.0, 5.1.0.1, 5.1.0.2, 5.1.0.3, 5.1.0.4, 5.1.0.5
Lotus Quickr services for WebSphere Portal versions:
8.0, 8.0.0.2, 8.1, 8.1.1, 8.1.1.1
===========
VII. Credit
===========
The vulnerability was discovered by Oren Hafif of Hacktics Ltd.
---
Ofer Maor
CTO, Hacktics
Chairman, OWASP Israel
Web: www.hacktics.com
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists