{"securityvulns": [{"lastseen": "2018-08-31T11:10:33", "bulletinFamily": "software", "description": "Hacktics Research Group Security Advisory \r\nhttp://www.hacktics.com/#view=Resources%7CAdvisory\r\n\r\nBy Oren Hafif, Hacktics.\r\n24-Feb-2010\r\n\r\n===========\r\nI. Overview\r\n===========\r\nDuring a penetration test performed by Hacktics' experts, certain\r\nvulnerabilities were identified in an IBM Websphere Portal Server and Lotus\r\nWeb Content Management deployment. Further research has identified that the\r\nlogin page of the IBM Lotus Workplace Web Content Management is vulnerable\r\nto Reflected Cross Site Scripting attacks.\r\n\r\nA friendly formatted version of this advisory is available in:\r\n http://www.hacktics.com/content/advisories/AdvIBM20100224.html\r\n\r\n===============\r\nII. The Finding\r\n===============\r\nAn attacker can inject script into a URL pointing at the vulnerable page,\r\nand attack system users by sending it to them. Users, who follow the link,\r\nwill be attacked with the injected script.\r\n\r\n============\r\nIII. Details\r\n============\r\nThe login page takes the query string from the request URL and embeds it\r\ninto the HTML response as the value of a form field named success. The\r\nattack is done by escaping the field (">), followed by the relevant script,\r\nas seen in the following URL:\r\n \r\nhttp://[host]:[port]/wps/wcm/webinterface/login/login.jsp?"><script>maliciou\r\ns_script</script><b%20"\r\n\r\nNote: The content of this parameter is used as part of a page redirection\r\nperformed after the login. Even without XSS exploitation, this can be used\r\nfor invalidated redirection.\r\n\r\n===========\r\nIV. Exploit\r\n===========\r\nThe exploit is performed by replacing malicious_script with the relevant\r\njavascript payload. An evasion for simple XSS signature protection (where\r\napplicable), can allow executing the same script without using HTML tags, as\r\nseen in the following sample:\r\n http://[host]:[port]/wps/wcm/webinterface/login/login.jsp?"\r\nstyle="tr:expression(malicious_script)\r\n\r\n\r\n=============================\r\nV. Vendor's Response/Solution\r\n=============================\r\nIBM has released a patch for this vulnerability, as well as a proposed\r\nworkaround. For additional details please refer to:\r\n http://www-01.ibm.com/support/docview.wss?uid=swg21421469\r\n\r\n====================\r\nVI. Affected Systems\r\n====================\r\nWebSphere Portal, Lotus Web Content Management and Workspace Web Content\r\nManagement versions:\r\n 6.1.0.0, 6.1.0.1, 6.1.0.2, 6.1.0.3, 6.1.5.0\r\n 6.0.1.0, 6.1.0.2, 6.1.0.3, 6.1.0.4, 6.1.0.5, 6.1.0.6, 6.1.0.7\r\n 6.0.0.0, 6.0.0.1, 6.0.0.2, 6.0.0.3, 6.0.0.4\r\n 5.1.0.0, 5.1.0.1, 5.1.0.2, 5.1.0.3, 5.1.0.4, 5.1.0.5\r\nLotus Quickr services for WebSphere Portal versions:\r\n 8.0, 8.0.0.2, 8.1, 8.1.1, 8.1.1.1\r\n\r\n===========\r\nVII. Credit\r\n===========\r\nThe vulnerability was discovered by Oren Hafif of Hacktics Ltd.\r\n\r\n---\r\nOfer Maor\r\nCTO, Hacktics\r\nChairman, OWASP Israel\r\n\r\nWeb: www.hacktics.com\r\n\r\n", "modified": "2010-03-02T00:00:00", "published": "2010-03-02T00:00:00", "id": "SECURITYVULNS:DOC:23311", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:23311", "title": "Hacktics Advisory Feb10: XSS in IBM WebSphere Portal & Lotus WCM", "type": "securityvulns", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2018-08-31T11:09:35", "bulletinFamily": "software", "description": "PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.", "modified": "2010-03-02T00:00:00", "published": "2010-03-02T00:00:00", "id": "SECURITYVULNS:VULN:10658", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:10658", "title": "Web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)", "type": "securityvulns", "cvss": {"score": 0.0, "vector": "NONE"}}]}