IBM WebSphere Portal Dojo Module Directory Traversal and Cross-Site Scripting Vulnerabilities


Description   Two vulnerabilities have been reported in IBM WebSphere Portal, which can be exploited by malicious people to disclose potentially sensitive information and conduct cross-site scripting attacks.
1) Certain input passed via the URL to the Dojo module is not properly verified before being used. This can be exploited to disclose the contents of arbitrary files via directory traversal sequences.
2) Certain unspecified input passed to the Dojo module is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
The vulnerabilities are reported in versions 7.0.0.1 and 7.0.0.2 before CF15 and 8.0.
     
Vulnerable Products   Vulnerable Software:
IBM WebSphere Portal 7.xIBM WebSphere Portal 8.x
     
Solution   Apply APARs PM64172 and PM65810 or apply Cumulative Fix.IBM WebSphere Portal 7.x:Apply Cumulative Fix 015 (PM65283 for V7.0.0.1 and PM65284 for V7.0.0.2)IBM WebSphere Portal 8.x:Apply Cumulative Fix 01 (PM65285)
     
CVE   CVE-2012-2181
     
References   IBM:
http://www.ibm.com/support/docview.wss?uid=swg21598363
http://www.ibm.com/support/docview.wss?uid=swg24029452
http://www.ibm.com/support/docview.wss?uid=swg24033155
X-Force:
http://xforce.iss.net/xforce/xfdb/75584
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
Misc : Directory traversal - parameter starting with ../
3.2.0
Directory traversal using ..\..
3.2.0
Directory traversal
3.2.0
Directory traversal backward root folder
3.2.0
     


 
 
 
 
 Risk level 
Moderate 

 Vulnerability First Public Report Date 
2012-07-09 

 Target Type 
Server 

 Possible exploit 
Remote