IBM WebSphere Portal Cross-Site Scripting and Request Forgery Vulnerabilities


Description   Two vulnerabilities have been reported in IBM WebSphere Portal, which can be exploited by malicious people to conduct cross-site scripting and request forgery attacks.
1) The application allows users to perform certain actions via HTTP requests without performing proper validity checks to verify the requests. This can be exploited to conduct certain administrative actions when a logged-in user visits a specially crafted web page.
2) Certain input is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
The vulnerabilities are reported in versions 8.0.0 through 8.0.0.1.
     
Vulnerable Products   Vulnerable Software:
IBM WebSphere Portal 8.x
     
Solution   Apply Cumulative Fix 15 and Interim Fixes for APARs PI33329 and PI34987.
     
CVE   CVE-2015-0139
CVE-2014-6214
     
References   IBM (PI33329
PI34987):
http://www.ibm.com/support/docview.wss?uid=swg21697213
http://www.ibm.com/support/docview.wss?uid=swg24034497
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
XSS - Prevention - GET : suspicious 'iframe' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'meta' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious tag with event found in URL
3.2.0
XSS - Prevention - GET : suspicious 'applet' tag found in URL
3.2.0
XSS - Phishing : suspicious 'div' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' attribute found in URL
3.2.0
XSS - Prevention - GET : suspicious 'img' tag found in URL
3.2.0
XSS - Phishing : suspicious 'a' tag found in URL
3.2.0
XSS - Prevention - GET : cookie access attempt using script language found in URL
3.2.0
XSS - Prevention - GET : suspicious 'embed' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'object' tag found in URL
3.2.0
XSS - Phishing : suspicious 'form' tag found in URL
3.2.0
XSS - Prevention - GET : javascript code found in URL
3.2.0
XSS - Prevention - GET : evasion attempt using tag characters encoding in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' tag found in URL
3.2.0
XSS - Phishing : suspicious 'link' tag found in URL
3.2.0
XSS - Prevention - GET : 'script' tag found in URL
3.2.0
XSS - Prevention - GET : 'location' javascript object found in URL
3.2.0
XSS - Prevention - GET : suspicious 'div' tag found in URL
3.2.0
     


 
 
 
 
 Risk level 
Low 

 Vulnerability First Public Report Date 
2015-03-12 

 Target Type 
Server 

 Possible exploit 
Remote