Flashes (Alerts)
Abstract
IBM® TRIRIGA® Application Platform has potential Cross-Site scripting vulnerabilities in various URLs.
Content
VULNERABILITY DETAILS
CVE ID:
CVE-2012-5948
DESCRIPTION: Cross-Site Scripting vulnerabilities may enable malicious scripts to be injected into certain URLs. Customers on certain versions of the IBM TRIRIGA Application Platform are potentially impacted by these vulnerabilities, which can cause various issues including but not limited to broken pages or application functionality, and the ability to forward data from the page to an external (unauthorized) site. A complete list of impacted URLs is provided below:
/WebProcess.srv (Parameter: attr_seq_1001) |
/html/en/default/common/colorPicker.jsp (Parameter: fieldName) |
/html/en/default/listEditor/listValuePicker.jsp (Parameter: atrSeq) |
/html/en/default/listEditor/listValuePicker.jsp (Parameter: fieldName) |
/html/en/default/listEditor/listValuePicker.jsp (Parameter: listId) |
/html/en/default/listEditor/listValuePicker.jsp (Parameter: parentListId) |
/html/en/default/smartobject/dateConversion.jsp (Parameter: fieldName) |
/html/en/default/smartobject/dateTimeConversion.jsp (Parameter: fieldName) |
/html/en/default/appsecurity/addGroups.jsp (Parameter: specTypeId) |
/html/en/default/appsecurity/addGroups.jsp (Parameter: parentSOCategoryId) |
/html/en/default/appsecurity/addGroups.jsp (Parameter: parentSOTypeId) |
/html/en/default/appsecurity/addGroups.jsp (Parameter: rowNo) |
/html/en/default/appsecurity/addGroups.jsp (Parameter: parentSOId) |
/html/en/default/appsecurity/addGroups.jsp (Parameter: refSpecTypeId) |
/html/en/default/appsecurity/addGroups.jsp |
/html/en/default/appsecurity/addGroups.jsp (Parameter: parentSOSubCategoryId) |
/html/en/default/common/objectUsage.jsp (Parameter: objectName) |
/html/en/default/common/objectUsage.jsp |
/html/en/default/reportTemplate/assocFilterList.jsp (: reportTemplId) |
/html/en/default/reportTemplate/reportTemplateDesc.jsp (Parameter: recordState, oldName, associatedField) |
/html/en/default/docmgmt/objectupload/upload.jsp (Parameter: specClassType) |
/html/en/default/docmgmt/objectupload/dd/index.jsp (Parameter: parentSOId, parentSOSubCategoryId), |
/html/en/default/listEditor/listEditorMgrListType.jsp (Parameter: name, type, label, description) |
/html/en/default/smartobjecttype/associateBOLoad.jsp (Parameter: moduleId, assBO, propertyId) |
/html/en/default/smartobjecttype/associateBOModuleTree.jsp (Parameter: propertyId) |
/html/en/default/om2/omComparisonReport.jsp (Parameter: tempSpecId) |
/html/en/default/om2/omExport.jsp (Parameter: tempSpecId) |
/html/en/default/om2/omExportPackageCreator.jsp |
/html/en/default/om2/omProperty.jsp (Parameter: tDesc, tName) |
/html/en/default/om2/omValidate.jsp (Parameter: tempSpecId) |
/html/en/default/om2/selectUser.jsp (Parameter: idField, nameField) |
/html/en/default/common/whereUsedFrame.jsp (Parameter: objectName) |
/html/en/default/common/whereUsedFrame.jsp (Parameter: objectName) |
/html/en/default/gui/guiCopy.jsp (Parameter: tName) |
/html/en/default/gui/sectionProperty.jsp |
/html/en/default/gui/sectionTabCopy.jsp |
DOM Based Cross-Site Scripting /WebProcess.srv, Scan Name = translationsDocumentManager |
DOM Based Cross-Site Scripting /html/en/default/docmgmt/manager/viewDocBrava.jsp |
/Widget/resource (Parameter: img) |
/html/en/default/common/whereUsedFrame.jsp (Parameter: objectName) |
/html/en/default/datamodeller/associateBOList.jsp (Parameter: toDoDisable) |
/html/en/default/listEditor/listEditorMgrListType.jsp (Parameter: name, type, label, description) |
/html/en/default/admin/addWFAgentUserSetting.jsp (Parameter: agentId) |
/html/en/default/admin/analyzeMain.jsp (Parameter: PARAMETER_0_0, SCHEMA_TYPE_0, TABLE_NAME_0, INDEX_NAME_0) |
/html/en/default/admin/editProperties.jsp (Parameter: name) |
/html/en/default/admin/requestTest.jsp |
/html/en/default/admin/requestTest.jsp |
/html/en/default/admin/schedulerManager.jsp (Parameter: current_DAILY, current_MONTHLY, current_YEARLY, current_WEEKLY) |
/html/en/default/admin/viewProperties.jsp (Parameter: name) |
/html/en/default/appsecurity/addPeopleToProduct.jsp |
/html/en/default/appsecurity/prodUserList.js |
/birt/frameset (Parameter:system__recordIds) |
/ganttlib/gantt-jws.jnlp, Scan Name = appscanPortalRuntime |
/ganttlib/gantt-jws.jnlp (Parameter: sessionId, userDateFormat, tempSpecId, readOnly, projectSpecId, queryId, contextPath, title, userDateTimeFormat, projectName) |
/html/en/default/om2/omObjectFinder.jsp (Parameter: tempSpecId, objectName, modifiedBy, modifiedAfter, idlist) |
/html/en/default/om2/omObjects.jsp (parameter: tempSpecId) |
/html/en/default/reportTemplate/reportTemplateDesc.jsp (Parameter: oldName) |
/Widget/resource (Parameter: img) |
/html/en/default/docmgmt/manager/viewDocBrava.jsp |
CVSS:
CVSS Base Score: 3.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/80628 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:C/A:C)
AFFECTED PLATFORMS:
The following versions are affected. IBM TRIRIGA Application Platform 3.3 is not impacted.
· IBM TRIRIGA Application Platform 3.2.1 and fix packs
· IBM TRIRIGA Application Platform 3.2 and fix packs
· TRIRIGA Application Platform 3.1 and fix packs
· TRIRIGA Application Platform 3.0 and fix packs
· TRIRIGA Application Platform 2.7 and fix packs
· TRIRIGA Application Platform 2.6 and fix packs
· TRIRIGA Application Platform 2.5 and fix packs
· TRIRIGA Application Platform 2.1 and fix packs
· TRIRIGA Application Platform 8 and fix packs
REMEDIATION:
The recommended solution is to apply the fix for each named product as soon as practical. Please see below for information on the fixes available.
Fix:
These vulnerabilities are resolved in IBM TRIRIGA Application Platform 3.3. Due to the threat posed by a successful attack, IBM strongly recommends that customers upgrade their platform to version 3.3 as soon as possible. Instructions on how to download and install IBM TRIRIGA Application Platform 3.3 can be found here: IBM TRIRIGA Application Platform 3.3 Download Instructions
Workaround:
Until you apply the fixes, it may be possible to reduce the risk of successful attack by restricting network protocols required by an attack. For attacks that require certain privileges or access to certain packages, removing the privileges or the ability to access the packages from unprivileged users may help reduce the risk of successful attack. Both approaches may break application functionality, so IBM strongly recommends that customers test changes on non-production systems. Neither approach should be considered a long-term solution as neither corrects the underlying problem.
Mitigation:
None Known
REFERENCES:
· Complete CVSS v2 Guide
· On-line Calculator V2
· CVE-2012-5948
· X-Force Database
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.
Note: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
Related Information
Was this topic helpful?
Document Information
Modified date:
25 September 2022
UID
swg21628847