Lucene search

K
ibmIBMD45D26E064E8B6FCE576AFB24F93C2A5BFE0713AEFA88F5A3465B8D1479F0BBD
HistoryJun 17, 2018 - 4:46 a.m.

Security Bulletin: IBM Rational Build Forge Java API Documentation Frame Injection Vulnerability (CVE-2013-1571)

2018-06-1704:46:25
www.ibm.com
3

0.904 High

EPSS

Percentile

98.8%

Summary

Java API Documentation contains a frame injection vulnerability.

Vulnerability Details

| Subscribe to My Notifications to be notified of important product support alerts like this.

  • Follow this link for more information (requires login with your IBM ID)
    —|—

CVEID: CVE-2013-1571

**Description:**HTML documentation generated by the Javadoc tool contains a security vulnerability. The vulnerability allows an attacker to craft a malicious link to the documentation which injects arbitrary content into the main frame. The injected content appears to originate from the site hosting the documentation, but in fact it is hosted elsewhere, and may contain malicious links or content. This type of attack is known as “clickjacking”.

The attack does not require authentication and may be exploited remotely if the HTML page is network available, but some degree of specialized knowledge and techniques are required. An exploit would not impact the confidentiality of information or the availability of the system, but data integrity could be compromised.

CVSS Base Score: 4.3 **CVSS Temporal Score:*See <https://exchange.xforce.ibmcloud.com/vulnerabilities/84715&gt; for the current score CVSS Environmental Score: Undefined CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

Affected Products and Versions

IBM Rational Build Forge version 8.0 and all previous versions.

Remediation/Fixes

If you are hosting publicly facing Java API Documentation, you are strongly encouraged to use Oracle’s Java API Documentation Updater Tool, a repair-in-place tool meant to correct existing documentation.

The Tool is available to all Java users on www.oracle.com/technetwork/java/javase/downloads/.

Workarounds and Mitigations

None