IBM WebSphere Portal Multiple Vulnerabilities


Description   A weakness and multiple vulnerabilities have been reported in IBM WebSphere Portal, which can be exploited by malicious people to conduct spoofing and cross-site scripting attacks, cause a DoS (Denial of Service), and compromise a vulnerable system.
For more information:
SA59995
SA60507 (#2 and #3)
1) Certain unspecified input is not properly verified before being used to redirect users. This can be exploited to redirect a user to an arbitrary website e.g. when a user clicks a specially crafted link to the affected script hosted on a trusted domain.
The weakness and vulnerabilities are reported in versions 8.0.0 through 8.0.0.1.
     
Vulnerable Products   Vulnerable Software:
IBM WebSphere Portal 8.x
     
Solution   Update to Fix Pack 8.0.0.1 with Cumulative Fix 16 (CF16) and apply APARs PI39234 and PI38632.
     
CVE   CVE-2015-1921
CVE-2015-1908
CVE-2015-1886
CVE-2015-0493
CVE-2015-0474
     
References   IBM (PI37356
PI37661
PI39234
PI38632):
http://www.ibm.com/support/docview.wss?uid=swg21701566
http://www.ibm.com/support/docview.wss?uid=swg21883995
http://www.ibm.com/support/docview.wss?uid=swg21884060
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
XSS - Prevention - GET : suspicious 'iframe' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'meta' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious tag with event found in URL
3.2.0
XSS - Prevention - GET : suspicious 'applet' tag found in URL
3.2.0
XSS - Phishing : suspicious 'div' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' attribute found in URL
3.2.0
XSS - Prevention - GET : suspicious 'img' tag found in URL
3.2.0
XSS - Phishing : suspicious 'a' tag found in URL
3.2.0
XSS - Prevention - GET : cookie access attempt using script language found in URL
3.2.0
XSS - Prevention - GET : suspicious 'embed' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'object' tag found in URL
3.2.0
XSS - Phishing : suspicious 'form' tag found in URL
3.2.0
XSS - Prevention - GET : javascript code found in URL
3.2.0
XSS - Prevention - GET : evasion attempt using tag characters encoding in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' tag found in URL
3.2.0
XSS - Phishing : suspicious 'link' tag found in URL
3.2.0
XSS - Prevention - GET : 'script' tag found in URL
3.2.0
XSS - Prevention - GET : 'location' javascript object found in URL
3.2.0
XSS - Prevention - GET : suspicious 'div' tag found in URL
3.2.0
     


 
 
 
 
 Risk level 
Moderate 

 Vulnerability First Public Report Date 
2015-04-20 

 Target Type 
Client + Server 

 Possible exploit 
Remote