Article - CS244377
XSS vulnerability detected by Rational AppScan in Integrity webui (Integrity)
Modified: 19-Nov-2018
Applies To
- PTC RV&S (formerly Integrity Lifecycle Manager) 2007 to 11.0
Description
- Problem
- XSS vulnerability detected by Rational AppScan in Integrity webui
- Cross site scripting finding by RSA scan
- URL http://<server>:<port>/JSON-RPC/im?jsessionid=<jsessionID>?mks.commandRunner=1<img%20src%3da%20onerror%3dalert('xss')> is flagged by security software.
- Steps to reproduce
- Type in the following URL which contains an alert function to Integrity 10.9 server and throw the GET request.
- http://<server>:<port>/JSON-RPC/im?jsessionid=<jsessionID>?mks.commandRunner=1<img%20src%3da%20onerror%3dalert('xss')>
- Example: http://localhost:7001/JSON-RPC/im;jsessionid=56507E506A612986C1B6EF2BADDB34A2?mks.commandRunner=3<img%20src%3da%20onerror%3dalert('xss')>
- As the result, you can see the alert dialog as the result of the function.
- Type in the following URL which contains an alert function to Integrity 10.9 server and throw the GET request.
- Expected result
Integrity server should not allow to run the function by throwing the GET request.
- Workaround
- Enabling XSS Filters on browsers will prevent this vulnerability
- Most modern browsers have this feature enabled by default
- Internet Explorer:
- Click Tools and then Internet Options
- Select the Security Tab
- Select Internet or Local Intranet (Whichever is appropriate for Integrity Server connection)
- Select Custom Level
- Find Enable XSS Filter and make sure it is Enabled
This is a printer-friendly version of Article 244377 and may be out of date. For the latest version click CS244377