Direct links to fixes
APAR status
Closed as fixed if next.
Error description
A Cross Site Scripting (XSS) attack occurs when an attacker uses a web application to inject malicious code in the form of a client side script arbitrary JavaScript to an end user. ONE EXAMPLE OF MANY THROUGHOUT THE APPLICAITON: Attack value: <img src='x' onerror='alert("7")'> Reproduction steps: 1. Login into application 2. Navigate to "My Reports" tab 3. Click on "New" button 4. Apply the attack value in "Header (Title)" textbox 5. Fill other required details and click on "Save" button 6. Click on "Run Report" button Again, this specific case is only with "My Reports" - we've replicated this issue in many locations throughout the entire site.
Local fix
no
Problem summary
A cross-site scripting security vulnerability was resolved in report manager. This is targeted to the 1H2016 release
Problem conclusion
Temporary fix
Comments
APAR Information
APAR number
IV82435
Reported component name
TRI APP PLTFM R
Reported component ID
5725F26RE
Reported release
350
Status
CLOSED FIN
PE
NoPE
HIPER
NoHIPER
Special Attention
NoSpecatt / Xsystem
Submitted date
2016-03-08
Closed date
2016-03-14
Last modified date
2016-03-14
APAR is sysrouted FROM one or more of the following:
APAR is sysrouted TO one or more of the following:
Modules/Macros
999
Fix information
Applicable component levels
[{"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SSHEB3","label":"IBM TRIRIGA Application Platform"},"Component":"","ARM Category":[],"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"350","Edition":"","Line of Business":{"code":"LOB59","label":"Sustainability Software"}}]
Document Information
Modified date:
30 March 2022