Security Bulletin
Summary
Query is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the HTML() function. A remote attacker could exploit this vulnerability to execute script in a victim's Web browser within the security context of the hosting Web site. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
Vulnerability Details
CVEID: CVE-2020-11023
DESCRIPTION: jQuery is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the option elements. A remote attacker could exploit this vulnerability to inject malicious script into a Web page which would be executed in a victim's Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
CVSS Base score: 6.1
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/181350 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)
CVEID: CVE-2020-11022
DESCRIPTION: jQuery is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the jQuery.htmlPrefilter method. A remote attacker could exploit this vulnerability to inject malicious script into a Web page which would be executed in a victim's Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
CVSS Base score: 6.1
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/181349 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)
Affected Products and Versions
| Affected Product(s) | Version(s) |
| DataQuant for z/OS | 2.1 |
| DataQuant for Multiplatforms | 2.1 |
Remediation/Fixes
Please see "Workarounds."
Workarounds and Mitigations
Steps for DataQuant Workstation:
- Close DataQuant.
- Navigate to the plugins directory present within DataQuant install directory.
Example: <DATAQUANT_HOME>/DataQuant For Workstation/plugins
- Locate the folder - com.ibm.bi.reporter_2.1.7.20170216 in the above Directory. Take a backup & remove the directory along with contents from this location.
- Download the attached zip file & extract it to a temporary location.
- Place the extracted folder in the directory <DATAQUANT_HOME>/DataQuant For Workstation/plugins.
- Once replaced, launch DataQuant.
Steps for DataQuant WebSphere:
- On a deployed product instance, stop the DataQuant WebSphere application.
- Locate the plugin folder - com.ibm.bi.reporter_2.1.7.20170216. Take a backup and remove it from the plugins directory.
Standard location → <IBM_WebSphere>\AppServer\profiles\AppSrv01\installedApps\ams-vm-qmf11Node01Cell\DataQuant for WebSphere 2.1.ear\DataQuantWebSphere21.war\WEB-INF\eclipse\plugins\
- Download the attached zip file & extract it to a temporary location.
- Place the extracted folder in the directory → <IBM_WebSphere>\AppServer\profiles\AppSrv01\installedApps\MyMachineNode01Cell\DataQuant for WebSphere 2.1.ear\DataQuantWebSphere21.war\WEB-INF\eclipse\plugins\
- Optionally, to copy files for WebSphere application server on windows using XCOPY command run step 6
- Open command prompt with 'Run As Administrator' option and use the XCOPY command
For Example → Xcopy /E /I "<UserLocationForDownloadedZip>\com.ibm.bi.reporter_2.1.8.20200927" "<IBM_WebSphere>\AppServer\profiles\AppSrv01\installedApps\MyMachineNode01Cell\DataQuant for WebSphere 2.1.ear\DataQuantWebSphere21.war\WEB-INF\eclipse\plugins\com.ibm.bi.reporter_2.1.8.20200927"
- Start the DataQuant application within WebSphere.
Get Notified about Future Security Bulletins
References
Change History
07 Oct 2020: Initial Publication
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Document Location
Worldwide
Was this topic helpful?
Document Information
Modified date:
07 October 2020
Initial Publish date:
07 October 2020
UID
ibm16344085