IBM Web Traffic Express (WTE) HTML tag cross-site scripting
|ibm-wte-html-xss (10453)||Medium Risk|
IBM Web Traffic Express (WTE) is vulnerable to cross-site scripting. A remote attacker could embed malicious script within HTML tags in a URL request to the Web Traffic Express proxy server, which would be executed in the victim's Web browser within the security context of the hosting site, once the link is clicked. An attacker could use this vulnerability to steal the victim's cookies or perform other malicious activity against the affected server.
For IBM Web Traffic Express 4.x:
Apply efix build 188.8.131.52 or later, available from the IBM FTP site. Refer to Rapid 7, Inc. Security Advisory R7-0007 for more information. See References.
For IBM Web Traffic Express 3.6:
Contact IBM Technical Support for information on obtaining an upgrade or patch. See References.
- IBM Web site: WebSphere Edge Server - Product Overview - IBM Software.
- IBM Web site: IBM Support & downloads - United States.
- Packetstorm Security Website: IBM Edge Components Caching Proxy Cross Site Scripting.
- Rapid 7, Inc. Security Advisory R7-0008: IBM WebSphere Edge Server Caching Proxy Cross-Site Scripting Issues.
- BID-6000: IBM Websphere Edge Server Cross Site Scripting Vulnerability
- CVE-2002-1167: Cross-site scripting (XSS) vulnerability in IBM Web Traffic Express Caching Proxy Server 3.6 and 4.x before 184.108.40.206 allows remote attackers to execute script as other users via an HTTP GET request.
- OSVDB ID: 16014: IBM Web Traffic Express Caching Proxy Server HTTP GET Request XSS
- IBM WebSphere Caching Proxy Server 3.6
- IBM WebSphere Caching Proxy Server 4.0
Oct 23, 2002
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this