IBM Support

Security Bulletin: Reflected and Persistent cross-site scripting vulnerabilities found in WebSphere Commerce (CVE-2015-5008, CVE-2015-5009)

Security Bulletin


Summary

IBM WebSphere Commerce Enterprise, Professional, Express, and Developer is vulnerable to reflected and persistent cross-site scripting, caused by improper validation of user-supplied input. The following are affected: Aurora starter store, Commerce Management Center, Accelerator, Organization Administration Console.

A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.

Vulnerability Details

CVEID: CVE-2015-5008
DESCRIPTION:
IBM WebSphere Commerce Enterprise, Professional, Express, and Developer is vulnerable to reflected cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
CVSS Base Score: 6.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/106319 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)

CVEID: CVE-2015-5009
DESCRIPTION:
IBM WebSphere Commerce Enterprise, Professional, Express, and Developer is vulnerable to persistent cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
CVSS Base Score: 5.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/106320 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)

Affected Products and Versions

WebSphere Commerce version 8.0.0.0
WebSphere Commerce versions 7.0.0.1 - 7.0.0.9
WebSphere Commerce version 7 Feature Packs 5 - 8
WebSphere Commerce versions 6.0.0.0 - 6.0.0.11
WebSphere Commerce version 6 Feature Pack 4

Remediation/Fixes

Product VRMF Remediation
WebSphere Commerce 8.0.0.0 Install 8.0.0.1 (JR54824 and JR54825)
7.0 up to Fix Pack 6 Upgrade to Fix Pack 7 or higher and then install APARs JR54265 and JR54825
7.0 Fix Pack 7 - 9 Install APARs JR54265 and JR54825
7.0 Feature Pack 5 Install APARs JR54432, JR54834, JR54899
7.0 Feature Pack 6 - 7 Install APARs JR54432, JR54264, JR54834, JR54899
7.0 Feature Pack 8 Install APARs JR54432, JR54264, JR54834 and JR54824
6.0 up to Fix Pack 10 Upgrade to Fix Pack 11 and then install APARs JR54265 and JR54825
6.0 Fix Pack 11 Install APARs JR54265 and JR54825
6.0 Feature Pack 4 Install APAR JR54264

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

Related information

Change History

11 January 2016: Updated APAR links
4 January 2016: Original version published

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Related information

A Japanese translation is available


Cross reference information
Segment Product Component Platform Version Edition
Commerce WebSphere Commerce - Express Security IBM i, Linux, Windows 7.0, 6.0 Express
Commerce WebSphere Commerce Developer Enterprise Security Windows 8.0, 7.0, 6.0 All Editions
Commerce WebSphere Commerce Professional Security AIX, IBM i, Linux, Solaris, Windows 8.0, 7.0, 6.0 Professional Edition
Commerce WebSphere Commerce Enterprise Security AIX, IBM i, Linux, Solaris, Windows 8.0, 7.0, 6.0 All Editions

Document information

More support for: WebSphere Commerce Enterprise
Security

Software version: 6.0, 7.0, 8.0

Operating system(s): AIX, IBM i, Linux, Solaris, Windows

Software edition: All Editions

Reference #: 1972610

Modified date: 2016-01-11