Description
|
|
Two vulnerabilities have been reported in IBM WebSphere Portal, which can be exploited by malicious people to disclose potentially sensitive information and conduct cross-site scripting attacks.
1) Certain input passed via the URL to the Dojo module is not properly verified before being used. This can be exploited to disclose the contents of arbitrary files via directory traversal sequences.
2) Certain unspecified input passed to the Dojo module is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
The vulnerabilities are reported in versions 7.0.0.1 and 7.0.0.2 before CF15 and 8.0.
|
|
|
|
Vulnerable Products
|
|
Vulnerable Software: IBM WebSphere Portal 7.xIBM WebSphere Portal 8.x
|
|
|
|
Solution
|
|
Apply APARs PM64172 and PM65810 or apply Cumulative Fix.IBM WebSphere Portal 7.x:Apply Cumulative Fix 015 (PM65283 for V7.0.0.1 and PM65284 for V7.0.0.2)IBM WebSphere Portal 8.x:Apply Cumulative Fix 01 (PM65285)
|
|
|
|
CVE
|
|
CVE-2012-2181
|
|
|
|
References
|
|
IBM:
http://www.ibm.com/support/docview.wss?uid=swg21598363
http://www.ibm.com/support/docview.wss?uid=swg24029452
http://www.ibm.com/support/docview.wss?uid=swg24033155
X-Force:
http://xforce.iss.net/xforce/xfdb/75584
|
|
|
|
Vulnerability Manager Detection
|
|
No
|
|
|
|
IPS Protection
|
|
|
|
|
|