IBM WebSphere Application Server Java Servlet Error Page XSS

2001-07-02T00:00:00
ID OSVDB:829
Type osvdb
Reporter OSVDB
Modified 2001-07-02T00:00:00

Description

Vulnerability Description

IBM WebSphere contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate user input upon submission to the Java Servlet which is in turn passed to the error handler. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Currently, there are no known workarounds or upgrades to correct this issue. However, IBM has released a patch to address this vulnerability.

Short Description

IBM WebSphere contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate user input upon submission to the Java Servlet which is in turn passed to the error handler. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Manual Testing Notes

WebSphere 3.5 FP2: http://[victim]/webapp/examples/<SCRIPT>alert(document.cookie)</SCRIPT> WebSphere 3.02: http://[victim]/<SCRIPT>alert(document.cookie)</SCRIPT>.jsp

References:

Vendor Specific Solution URL: http://www-4.ibm.com/software/webservers/appserv/efix.html Vendor Specific News/Changelog Entry: http://www-1.ibm.com/support/docview.wss?rs=180&uid=swg27006876 Vendor Specific Advisory URL Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2001-07/0021.html CVE-2001-0824 CERT VU: 560659 Bugtraq ID: 2969