Troubleshooting
Problem
The Web application is susceptible to UI overlay attacks allowing the users click attempts to be under the control of an attacker and the requests forwarded to a new location. Note: only the unauthenticated login pages were tested: a live node and credentials were not provisioned for testing.
Document Location
Worldwide
[{"Business Unit":{"code":"BU048","label":"IBM Software"},"Product":{"code":"SS9GLA","label":"IBM Control Center"},"Component":"WebSphere Liberty","Platform":[{"code":"PF002","label":"AIX"},{"code":"PF016","label":"Linux"},{"code":"PF043","label":"Red Hat"},{"code":"PF048","label":"SUSE"},{"code":"PF033","label":"Windows"}],"Version":"All Versions","Edition":"","Line of Business":{"code":"LOB77","label":"Automation Platform"}}]
Log InLog in to view more of this document
This document has the abstract of a technical article that is available to authorized users once you have logged on. Please use Log in button above to access the full document. After log in, if you do not have the right authorization for this document, there will be instructions on what to do next.
Was this topic helpful?
Document Information
More support for:
IBM Control Center
Software version:
All Versions
Operating system(s):
AIX, Linux, Red Hat, SUSE, Windows
Document number:
959885
Modified date:
17 January 2023
UID
ibm10959885
Manage My Notification Subscriptions