Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
Date: Wed Mar 19 2008 - 13:39:11 CDT
IBM Rational ClearQuest Web Multiple XSS
Discovered on 07-24-07 by sasquatch of SecureState - www.securestate.com
Multiple cross site scripting vulnerabilities exist within IBM's Rational ClearQuest Web interface.
contextid (query string parameter)
schema (query string parameter)
userNameVal ("User Name" text box)
POC URL: http://www.website.com/cqweb/login?/cqweb/main?command=GenerateMainFrame&service=CQ&schema=SCHEMAHERE"; alert('XSS');//&contextid=DATABASECONTEXTHERE"; alert('XSS');//
username (query string parameter)
POC URL: http://www.website.com/cqweb/login?targetUrl=/cqweb/main?command=GenerateMainFrame&ratl_userdb=DBHERE,&test=&clientServerAddress=http://www.website.com/cqweb/login&username=test</script><script>alert('xss')</script>&password=test&schema=SCHEMAHERE&userDb=DBHERE
Test fixes are now available from IBM Rational Support for versions 2003.06.16 Patch 2007C, 188.8.131.52_iFix04, and 184.108.40.206_iFix01.
These are the latest available patch releases before December 19, 2007.
Test fixes will be made available from IBM Rational Support some time in January 2008 for versions 2003.06.16 Patch 2007D, 220.127.116.11, and 18.104.22.168.
These patch releases became available on December 19, 2007 but there was no time to fix this vulnerability in these releases.
For this reason, we will provide test fixes that do fix it some time in the middle or latter half of January 2008.
The following patch releases will fix this vulnerability: 2003.06.16 Patch 2008A, 22.214.171.124_iFix01, and 126.96.36.199_iFix01.
These patch releases were made available on March 4th, 2008.
Test fixes are only available by calling IBM Rational Support, which then provides them to customers.
Patch releases are available via download. Please contact IBM Rational Support for detailed information.