ID

VAR-190001-0117


TITLE

IBM Tivoli Security Information and Event Manager Custom Report Cross-Site Scripting Vulnerability

Trust: 1.2

sources: CNVD: CNVD-2011-3606 // CNNVD: CNNVD-201109-146

DESCRIPTION

IBM Tivoli Security Information and Event Manager is an automated security management solution that enables customers to deploy real-time threat management and compliance management in the data center with user activity monitoring and log management. TSIEM has a cross-site scripting attack, and the input passed to the custom report lacks filtering before returning to the user, which can lead to cross-site scripting attacks, where an attacker can obtain sensitive information or hijack a user session. The IBM Tivoli Security Information and Event Manager is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. IBM Tivoli Security Information and Event Manager 2.0 is affected. ---------------------------------------------------------------------- The new Secunia Corporate Software Inspector (CSI) 5.0 Integrates with Microsoft WSUS & SCCM and supports Apple Mac OS X. Get a free trial now and qualify for a special discount: http://secunia.com/vulnerability_scanning/corporate/trial/ ---------------------------------------------------------------------- TITLE: IBM Tivoli Security Information and Event Manager Custom Reports Cross-Site Scripting Vulnerability SECUNIA ADVISORY ID: SA45952 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/45952/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=45952 RELEASE DATE: 2011-09-13 DISCUSS ADVISORY: http://secunia.com/advisories/45952/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/45952/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=45952 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in IBM Tivoli Security Information and Event Manager, which can be exploited by malicious people to conduct cross-site scripting attacks. Certain input passed to custom reports is not properly sanitised before being returned to the user. SOLUTION: Apply fix pack 2.0.0-TIV-TSIEM-FP006 or hot fix 2.0.0-TIV-TSIEM-FIX00614 when available. PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.08

sources: CNVD: CNVD-2011-3606 // BID: 49555 // IVD: fb853fb4-1f88-11e6-abef-000c29c66e3d // PACKETSTORM: 105015

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: fb853fb4-1f88-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-3606

AFFECTED PRODUCTS

vendor:ibmmodel:tivoli security information and event managerscope:eqversion:2.0

Trust: 1.1

sources: IVD: fb853fb4-1f88-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-3606 // BID: 49555

CVSS

SEVERITY

CVSSV2

CVSSV3

IVD: fb853fb4-1f88-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

IVD: fb853fb4-1f88-11e6-abef-000c29c66e3d
severity: NONE
baseScore: NONE
vectorString: NONE
accessVector: NONE
accessComplexity: NONE
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: UNKNOWN

Trust: 0.2

sources: IVD: fb853fb4-1f88-11e6-abef-000c29c66e3d

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201109-146

TYPE

xss

Trust: 0.7

sources: PACKETSTORM: 105015 // CNNVD: CNNVD-201109-146

PATCH

title:IBM Tivoli Security Information and Event Manager custom patches for reporting cross-site scripting vulnerabilitiesurl:https://www.cnvd.org.cn/patchinfo/show/5042

Trust: 0.6

sources: CNVD: CNVD-2011-3606

EXTERNAL IDS

db:BIDid:49555

Trust: 1.5

db:CNVDid:CNVD-2011-3606

Trust: 0.8

db:SECUNIAid:45952

Trust: 0.7

db:CNNVDid:CNNVD-201109-146

Trust: 0.6

db:IVDid:FB853FB4-1F88-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:PACKETSTORMid:105015

Trust: 0.1

sources: IVD: fb853fb4-1f88-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-3606 // BID: 49555 // PACKETSTORM: 105015 // CNNVD: CNNVD-201109-146

REFERENCES

url:http://secunia.com/advisories/45952/

Trust: 0.7

url:http://www.securityfocus.com/bid/49555

Trust: 0.6

url:http://www-01.ibm.com/software/tivoli/products/security-info-event-mgr/

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg1iv02459

Trust: 0.3

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=45952

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/trial/

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/45952/#comments

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2011-3606 // BID: 49555 // PACKETSTORM: 105015 // CNNVD: CNNVD-201109-146

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 49555

SOURCES

db:IVDid:fb853fb4-1f88-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2011-3606
db:BIDid:49555
db:PACKETSTORMid:105015
db:CNNVDid:CNNVD-201109-146

LAST UPDATE DATE

2022-05-17T01:44:55.436000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2011-3606date:2011-09-13T00:00:00
db:BIDid:49555date:2011-09-09T00:00:00
db:CNNVDid:CNNVD-201109-146date:2011-09-14T00:00:00

SOURCES RELEASE DATE

db:IVDid:fb853fb4-1f88-11e6-abef-000c29c66e3ddate:2011-09-13T00:00:00
db:CNVDid:CNVD-2011-3606date:2011-09-13T00:00:00
db:BIDid:49555date:2011-09-09T00:00:00
db:PACKETSTORMid:105015date:2011-09-13T05:45:16
db:CNNVDid:CNNVD-201109-146date:1900-01-01T00:00:00