Article - CS244377

XSS vulnerability detected by Rational AppScan in Integrity webui (Integrity)

Modified: 19-Nov-2018   


Applies To

  • PTC RV&S (formerly Integrity Lifecycle Manager) 2007 to 11.0

Description

  • Problem
    • XSS vulnerability detected by Rational AppScan in Integrity webui
    • Cross site scripting finding by RSA scan
    • URL http://<server>:<port>/JSON-RPC/im?jsessionid=<jsessionID>?mks.commandRunner=1<img%20src%3da%20onerror%3dalert('xss')> is flagged by security software.
  • Steps to reproduce
    1. Type in the following URL which contains an alert function to Integrity 10.9 server and throw the GET request.
      • http://<server>:<port>/JSON-RPC/im?jsessionid=<jsessionID>?mks.commandRunner=1<img%20src%3da%20onerror%3dalert('xss')>
      • Example: http://localhost:7001/JSON-RPC/im;jsessionid=56507E506A612986C1B6EF2BADDB34A2?mks.commandRunner=3<img%20src%3da%20onerror%3dalert('xss')>
    2. As the result, you can see the alert dialog as the result of the function.
  • Expected result
Integrity server should not allow to run the function by throwing the GET request.
  • Workaround
    • Enabling XSS Filters on browsers will prevent this vulnerability
    • Most modern browsers have this feature enabled by default
    • Internet Explorer:
      1. Click Tools and then Internet Options
      2. Select the Security Tab
      3. Select Internet or Local Intranet (Whichever is appropriate for Integrity Server connection)
      4. Select Custom Level
      5. Find Enable XSS Filter and make sure it is Enabled
This is a printer-friendly version of Article 244377 and may be out of date. For the latest version click CS244377