IBM Rational ClearQuest Web Multiple XSS Vulnerabilities

Credit: sasquatch
Risk: Low
Local: No
Remote: Yes

CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

IBM Rational ClearQuest Web Multiple XSS CVE-2007-4592 Discovered on 07-24-07 by sasquatch of SecureState - Multiple cross site scripting vulnerabilities exist within IBM's Rational ClearQuest Web interface. VULNERABLE VARIABLES: ===================== contextid (query string parameter) schema (query string parameter) userNameVal ("User Name" text box) POC URL: &service=CQ&schema=SCHEMAHERE"; alert('XSS');//&contextid=DATABASECONTEXTHERE"; alert('XSS');// VULNERABLE VARIABLE: ==================== username (query string parameter) POC URL: eMainFrame&ratl_userdb=DBHERE,&test=&clientServerAddress=http://www.webs</script><script>alert('xss')</script>& password=test&schema=SCHEMAHERE&userDb=DBHERE VENDOR RESPONSE: ================ Test fixes are now available from IBM Rational Support for versions 2003.06.16 Patch 2007C,, and These are the latest available patch releases before December 19, 2007. Test fixes will be made available from IBM Rational Support some time in January 2008 for versions 2003.06.16 Patch 2007D,, and These patch releases became available on December 19, 2007 but there was no time to fix this vulnerability in these releases. For this reason, we will provide test fixes that do fix it some time in the middle or latter half of January 2008. The following patch releases will fix this vulnerability: 2003.06.16 Patch 2008A,, and These patch releases were made available on March 4th, 2008. Test fixes are only available by calling IBM Rational Support, which then provides them to customers. Patch releases are available via download. Please contact IBM Rational Support for detailed information.

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2022,


Back to Top