IBM Watson Cloud Computing SaaS suffers from cross site scripting and open redirect vulnerabilities.
acc63bbdedfdf83f7b1bfde9559b12ece29ab6b79619d0ed63d4289dad52db59
# Vulnerability type: Cross-site Scripting & Redirect
# Vendor: www.ibm.com
# Product: IBM Watson Cloud Computing SaaS (Cognea)
# Product Link: https://www.ibm.com/smarterplanet/us/en/ibmwatson/
# Credit: Jerold Hoong
The logout.jsp page function of the IBM Watson (Cognea) SaaS application is
vulnerable to reflected XSS and redirect attacks. The value of the Referer
HTTP header is directly referenced by the logout.jsp page and echoes the input
unmodified in to the applications response.
# PROOF OF CONCEPT (XSS)
- Sample URL: https://127.0.0.1/test/logout.jsp
- Parameter: Referer HTTP header
- Payload: javascript:alert('XSS')//
# PROOF OF CONCEPT (Redirect)
The logout.jsp page is vulnerable to unauthorised redirects.
- Sample URL: https://127.0.0.1/test/logout.jsp
- Parameter: Referer HTTP header
- Payload: https://malicious-site.com/
# TIMELINE
- 16/04/2015: Vulnerability found
- 17/04/2015: Vendor informed
- 08/04/2015: Vendor responded and acknowledged
- 03/06/2015: Vendor fixed the issue
- 04/06/2015: Public disclosure