CVE-2020-4702
Stored cross-site scripting
6.4 (Medium)
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
IBM InfoSphere (Metadata Asset Manager)
11.7.1
Maciej Kaczorowski
IBM InfoSphere Information Server 11.7 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI, thus altering the intended functionality, potentially exposing credentials within a trusted session.
Steps to reproduce:
- Go to the module „Metadata Asset Manager” and log in as administrator,
- Go to tab: „Administration” -> „Metadata Interchange Servers”,
- Click on the „New” button,
- In the field „Name” enter payload:
<img src=x onerror=alert(document.domain)>
, - In the field „Host” enter any string of characters,
- Click on the „Save” button,
- To make the injected JavaScript code execute:
- Click on the „Delete” button,
- Go to the „Import” tab,
- Click on the „New Import” button and then expand the list next to the field „Metadata interchange server”.
- 25-01-2020 - Vulnerability reported to the vendor
- 25-01-2020 - First response from the vendor
- 18-08-2020 - Vulnerability acknowledged by the vendor
- 03-09-2020 - Advisory published by IBM
- 03-09-2020 - Public disclosure
- 25-11-2021 - The PoC release