RS00133: VUNERABILITY TO CROSS-SITE SCRIPTING IN RTS ERROR MANAGEMENT

Subscribe

You can track all active APARs for this component.

APAR status

  • Closed as program error.

Error description

Local fix

  • in file teamserver-web-<app>.war
    edit the file content/internalError.jsp
    
    
    replace line 9
     message="#{InternalErrorBean.message}"
    
    with
         message="#{bundle.unknownError}"
    
    
    This will prevent the error message from being displayed
    directly in the web browser.
    
    The message itself is visible protected in the stack trace.
    

Problem summary

  • For example, if you embed something like
    ?<script>alert(31521);</script>? into an RTS url, the web page
    returned will include this in such a way that it will actually
    execute on the client, in this case causing a pop-up.
    

Problem conclusion

  • Vulnerability fixed.
    

Temporary fix

Comments

APAR Information

  • APAR number

    RS00133

  • Reported component name

    WS ILOG JRULES

  • Reported component ID

    5724X9800

  • Reported release

    670

  • Status

    CLOSED PER

  • PE

    NoPE

  • HIPER

    NoHIPER

  • Special Attention

    NoSpecatt

  • Submitted date

    2010-03-01

  • Closed date

    2010-06-21

  • Last modified date

    2010-06-21

  • APAR is sysrouted FROM one or more of the following:

  • APAR is sysrouted TO one or more of the following:

Fix information

  • Fixed component name

    WS ILOG JRULES

  • Fixed component ID

    5724X9800

Applicable component levels

  • R710 PSY

       UP



Rate this page:

(0 users)Average rating

Document information


More support for:

WebSphere ILOG JRules

Software version:

6.7

Reference #:

RS00133

Modified date:

2010-06-21

Translate my page

Machine Translation

Content navigation