what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

IBM Websphere Portal Cross Site Scripting

IBM Websphere Portal Cross Site Scripting
Posted Feb 26, 2010
Authored by Ofer Hafif | Site hacktics.com

IBM Websphere Portal Server and Lotus Web Content Management systems suffer from a cross site scripting vulnerability.

tags | exploit, web, xss
SHA-256 | 91942922c8003dfbfec21b6086688dd980aad8df11ec3cc970f82ef9bcb39a73

IBM Websphere Portal Cross Site Scripting

Change Mirror Download
Hacktics Research Group Security Advisory 
http://www.hacktics.com/#view=Resources%7CAdvisory

By Oren Hafif, Hacktics.
24-Feb-2010

===========
I. Overview
===========
During a penetration test performed by Hacktics' experts, certain
vulnerabilities were identified in an IBM Websphere Portal Server and Lotus
Web Content Management deployment. Further research has identified that the
login page of the IBM Lotus Workplace Web Content Management is vulnerable
to Reflected Cross Site Scripting attacks.

A friendly formatted version of this advisory is available in:
http://www.hacktics.com/content/advisories/AdvIBM20100224.html

===============
II. The Finding
===============
An attacker can inject script into a URL pointing at the vulnerable page,
and attack system users by sending it to them. Users, who follow the link,
will be attacked with the injected script.

============
III. Details
============
The login page takes the query string from the request URL and embeds it
into the HTML response as the value of a form field named success. The
attack is done by escaping the field (">), followed by the relevant script,
as seen in the following URL:

http://[host]:[port]/wps/wcm/webinterface/login/login.jsp?"><script>maliciou
s_script</script><b%20"

Note: The content of this parameter is used as part of a page redirection
performed after the login. Even without XSS exploitation, this can be used
for invalidated redirection.

===========
IV. Exploit
===========
The exploit is performed by replacing malicious_script with the relevant
javascript payload. An evasion for simple XSS signature protection (where
applicable), can allow executing the same script without using HTML tags, as
seen in the following sample:
http://[host]:[port]/wps/wcm/webinterface/login/login.jsp?"
style="tr:expression(malicious_script)


=============================
V. Vendor's Response/Solution
=============================
IBM has released a patch for this vulnerability, as well as a proposed
workaround. For additional details please refer to:
http://www-01.ibm.com/support/docview.wss?uid=swg21421469

====================
VI. Affected Systems
====================
WebSphere Portal, Lotus Web Content Management and Workspace Web Content
Management versions:
6.1.0.0, 6.1.0.1, 6.1.0.2, 6.1.0.3, 6.1.5.0
6.0.1.0, 6.1.0.2, 6.1.0.3, 6.1.0.4, 6.1.0.5, 6.1.0.6, 6.1.0.7
6.0.0.0, 6.0.0.1, 6.0.0.2, 6.0.0.3, 6.0.0.4
5.1.0.0, 5.1.0.1, 5.1.0.2, 5.1.0.3, 5.1.0.4, 5.1.0.5
Lotus Quickr services for WebSphere Portal versions:
8.0, 8.0.0.2, 8.1, 8.1.1, 8.1.1.1

===========
VII. Credit
===========
The vulnerability was discovered by Oren Hafif of Hacktics Ltd.

---
Ofer Maor
CTO, Hacktics
Chairman, OWASP Israel

Web: www.hacktics.com


Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close