---------------------------------------------------------------------- Secunia is pleased to announce the release of the annual Secunia report for 2008. Highlights from the 2008 report: * Vulnerability Research * Software Inspection Results * Secunia Research Highlights * Secunia Advisory Statistics Request the full 2008 Report here: http://secunia.com/advisories/try_vi/request_2008_report/ Stay Secure, Secunia ---------------------------------------------------------------------- TITLE: IBM WebSphere Application Server for z/OS Cross-Site Scripting and Insecure File Permissions SECUNIA ADVISORY ID: SA34461 VERIFY ADVISORY: http://secunia.com/advisories/34461/ DESCRIPTION: A vulnerability and a security issue have been reported in WebSphere Application Server, which can be exploited by malicious, local users to read or manipulate certain files, and by malicious people to conduct cross-site scripting attacks. 1) Input passed via unspecified parameters to the administrative console is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. This is related to vulnerability #1 in: SA34131 2) An error exists due to interim fixes that replace existing files or create new files incorrectly setting permission to 777. The vulnerability and the security issue are reported in WebSphere Application Server V7.0 for z/OS. SOLUTION: Apply APAR PK82988 or update to 7.0.0.3 for V7.0 for z/OS when it becomes available. PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: IBM (PK77505, PK77590): http://www-01.ibm.com/support/docview.wss?uid=swg1PK82988 OTHER REFERENCES: SA34131: http://secunia.com/advisories/34131/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------