Vulnerability Note VU#197318

IBM Net.Data db2www CGI interpreter fails to properly validate requested macro filenames

Original Release date: 08 Mar 2004 | Last revised: 19 Mar 2004

Overview

IBM Net.Data fails to properly validate user input passed to the db2www CGI interpreter, which could allow an attacker to mount a cross-site scripting attack against a vulnerable system.

Description

IBM Net.Data is a scripting language used to create web applications. Net.Data macros are supplied to a CGI interpreter (db2www) that generates HTML output. The db2www CGI interpreter fails to properly validate requested macro filenames before returning at least one type of error message (DTWP001E). It is possible to use a cross-site scripting technique to inject malicious script (JavaScript, VBScript, etc.) or HTML into the error message by using a specially crafted macro filename.

Impact

A remote attacker could access sensitive information related to the vulnerable web page (cookies, form values, URI data). The attacker could also attempt to mislead the user into providing sensitive information such as login credentials.

Solution

The CERT/CC is currently unaware of a practical solution to this problem.

Disable Scripting

To help defend against cross-site scripting attacks from the client's perspective, disable scripting in your web browser and HTML-enabled email client. Instructions for disabling scripting can be found in the CERT/CC Malicious Web Scripts FAQ.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
IBMAffected08 Mar 200415 Mar 2004
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

Thanks to Secunia for the information contained in their security advisory.

This document was written by Damon Morda.

Other Information

  • CVE IDs: Unknown
  • Date Public: 26 Jan 2004
  • Date First Published: 08 Mar 2004
  • Date Last Updated: 19 Mar 2004
  • Severity Metric: 1.58
  • Document Revision: 22

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.