Otkriven je sigurnosni propust pri radu aplikacijskog poslužitelja IBM WebSphere koji omogućuje zlonamjernim korisnicima izvođenje XSS napada i promjenu pojedinih podataka.
Paket:
IBM WebSphere Application Server 7.0.x
Operacijski sustavi:
HP-UX 11.x, IBM AIX 5.x, IBM AIX 6.x, IBM AIX 7.x, IBM z/OS 1.x, Microsoft Windows XP, Microsoft Windows Server 2003, Microsoft Windows Vista, Microsoft Windows Server 2008, Microsoft Windows 7, Red Hat Enterprise Linux 4, Red Hat Enterprise Linux 5, Red Hat Enterprise Linux 6, Sun Solaris 9, Sun Solaris 10, SUSE Linux Enterprise Server (SLES) 10
Problem:
neodgovarajuća provjera ulaznih podataka
Iskorištavanje:
udaljeno
Posljedica:
izmjena podataka, umetanje HTML i skriptnog koda
Rješenje:
zaobilazno rješenje (workaround)
CVE:
CVE-2010-3271
Izvorni ID preporuke:
SA44909
Izvor:
Secunia
Problem:
IBM WebSphere poslužitelj omogućuje korisnicima izvođenje određenih radnji putem HTTP zahtjeva bez provođenja ikakve provjere valjanosti podataka poslanih u sklopu tih zahtjeva.
Posljedica:
Na temelju uočene ranjivosti udaljeni napadač može izvesti XSS (eng. Cross-site scripting) napad te onemogućiti pojedine sigurnosne opcije u postavkama poslužitelja.
Rješenje:
Svim korisnicima se preporučuje da ne pregledavaju nesigurne web stranice i da ne otvaraju nepoznate poveznice dok su prijavljeni na aplikaciju.
IBM WebSphere Application Server Cross-Site Request Forgery Vulnerability
Secunia Advisory SA44909
Release Date 2011-06-16
Criticality level Less criticalLess critical
Impact Cross Site Scripting
Where From remote
Authentication level Available in Customer Area
Report reliability Available in Customer Area
Solution Status Unpatched
Systems affected Available in Customer Area
Approve distribution Available in Customer Area
Remediation status Secunia VIM
Software:
IBM WebSphere Application Server 7.0.x
Secunia CVSS Score Available in Customer Area
CVE Reference(s) CVE-2010-3271 CVSS available in Customer Area
Description
Core Security Technologies has reported a vulnerability in IBM WebSphere Application Server, which can be exploited by malicious people to conduct cross-site request forgery attacks.
The application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to e.g. disable the administrative security option in the master configuration by tricking a logged in administrative user into visiting a malicious web site.
The vulnerability is reported in version 7.0.0.11 and 7.0.0.13. Other versions may also be affected.
Solution
Do not browse untrusted sites or follow untrusted links while being logged-in to the application.
Provided and/or discovered by
Francisco Falcon, Core Security Technologies and Alejandro Rodriguez.
Original Advisory
CORE-2010-1021:
http://www.coresecurity.com/content/IBM-WebSphere-CSRF
Posljednje sigurnosne preporuke