Advertisement






IBM Sterling B2B Integrator 5.2.0.1 / 5.2.6.3 Cross Site Scripting

CVE Category Price Severity
CVE-2018-1513 CWE-79 Unknown High
Author Risk Exploitation Type Date
Unknown High Remote 2018-08-14
CPE
cpe:cpe:/a:ibm:sterling_b2b_integrator:5.2.0.1:~~~~ibm~~~sterling_b2b_integrator~5.2.6.3
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2018080094

Below is a copy:

IBM Sterling B2B Integrator 5.2.0.1 / 5.2.6.3 Cross Site Scripting
# Exploit Title: [IBM Sterling B2B Integrator persistent cross-site scripting]
# Exploit Author: [Vikas Khanna] (https://www.linkedin.com/in/leetvikaskhanna/) (https://twitter.com/MR_SHANU_KHANNA)
# Vendor Homepage: [https://www.ibm.com/support/knowledgecenter/en/SS3JSW_5.2.0/com.ibm.help.overview.doc/si_overview.html]
# Version: [IBM Sterling B2B Integrator 5.2.0.1 - 5.2.6.3] (REQUIRED)
# CVE : [CVE-2018-1513 & CVE-2018-1563]
 
 
Vulnerability Details
Vulnerability Name : Persistent Cross Site Scripting 
Affected Parameter(s) : fname & lname
 
Steps to reproduce
Step 1 : Login to the IBM Sterling B2B Integrator.
 
Step 2 : Navigate to Performance Tuning module, Username will be displayed as below :- 
                Last Edited By <USERNAME>
    Note :- Modify the configuration for example and check the Last Edited By - Username. Any user (Admin or Non admin) who have privileges to change the configuration can act like an attacker. 
 
Step 3 : Navigate to My Account and update first name and last name.
 
Step 4: Intercept the request using burp suite and insert the <Video><source onerror=aalert(1)a> payload & <Video><source onerror=aalert(2)a> payload in fname and lname parameter.
 
Step 5 : It has been observed that My account module is not vulnerable to XSS but Performance Tuning tab under Operations -> Performance is vulnerable, as the Performance Tuning tab displays the useras first name and last name separately as aLast Edited By USERNAMEa.
 
Step 6 : Now navigate to Performance Tuning module. It is seen that the application is vulnerable to Persistent Cross Site Scripting.
 
Note : It has been observed that any user who has access to Performance Tuning tab will be vulnerable and the same javascript payload will execute for them as well.


Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.