0day.today - Biggest Exploit Database in the World.
![](/img/logo_green.jpg)
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earnGOLD
Administration of this site uses the official contacts. Beware of impostors!
![We DO NOT use Telegram or any messengers / social networks!](/img/no_telegram_big.png)
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
IBM WebSphere Portal Server & Lotus WCM XSS Vulnerability
========================================================= IBM WebSphere Portal Server & Lotus WCM XSS Vulnerability ========================================================= =========== I. Overview =========== During a penetration test performed by Hacktics' experts, certain vulnerabilities were identified in an IBM Websphere Portal Server and Lotus Web Content Management deployment. Further research has identified that the login page of the IBM Lotus Workplace Web Content Management is vulnerable to Reflected Cross Site Scripting attacks. =============== II. The Finding =============== An attacker can inject script into a URL pointing at the vulnerable page, and attack system users by sending it to them. Users, who follow the link, will be attacked with the injected script. ============ III. Details ============ The login page takes the query string from the request URL and embeds it into the HTML response as the value of a form field named success. The attack is done by escaping the field (">), followed by the relevant script, as seen in the following URL: http://[host]:[port]/wps/wcm/webinterface/login/login.jsp?"><script>maliciou s_script</script><b%20" Note: The content of this parameter is used as part of a page redirection performed after the login. Even without XSS exploitation, this can be used for invalidated redirection. =========== IV. Exploit =========== The exploit is performed by replacing malicious_script with the relevant javascript payload. An evasion for simple XSS signature protection (where applicable), can allow executing the same script without using HTML tags, as seen in the following sample: http://[host]:[port]/wps/wcm/webinterface/login/login.jsp?" style="tr:expression(malicious_script) ============================= V. Vendor's Response/Solution ============================= IBM has released a patch for this vulnerability, as well as a proposed workaround. For additional details please refer to: http://www-01.ibm.com/support/docview.wss?uid=swg21421469 ==================== VI. Affected Systems ==================== WebSphere Portal, Lotus Web Content Management and Workspace Web Content Management versions: 6.1.0.0, 6.1.0.1, 6.1.0.2, 6.1.0.3, 6.1.5.0 6.0.1.0, 6.1.0.2, 6.1.0.3, 6.1.0.4, 6.1.0.5, 6.1.0.6, 6.1.0.7 6.0.0.0, 6.0.0.1, 6.0.0.2, 6.0.0.3, 6.0.0.4 5.1.0.0, 5.1.0.1, 5.1.0.2, 5.1.0.3, 5.1.0.4, 5.1.0.5 Lotus Quickr services for WebSphere Portal versions: 8.0, 8.0.0.2, 8.1, 8.1.1, 8.1.1.1 # 0day.today [2024-07-01] #