New vulnerability has been found which affects IBM Rational Performance Tester 184.108.40.206 and earlier version. Type of attack is called ClickJacking. This particular vulnerability allows attacker to create a malicious link to the documentation which injects arbitrary content to the mainframe. This attack does not require any authentication and may be exploited remotely if the HTML network is available.
This impact compromises the data integrity.
[stextbox id=”alert”]VULNERABILITY DETAILS:[/stextbox]
CVSS Base Score: 4.3
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/84715 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)
AFFECTED PRODUCTS AND VERSIONS:
IBM Rational Performance Tester version 220.127.116.11 and earlier
Users hosting publicly facing Java API Documentation are strongly encouraged use Oracle’s Java API Documentation Updater Tool, a repair-in-place tool meant to correct existing documentation.
The Tool is available to all Java users on www.oracle.com/technetwork/java/javase/downloads/
- Complete CVSS Guide
- On-line Calculator V2
- X-Force Vulnerability Database http://xforce.iss.net/xforce/xfdb/84715
Thanks for visiting QAInsights! Check out our new portal Testifications.com to get updates on Software Testing related certifications. We’re always posting interesting articles on QAInsights. I request you to subscribe so you don’t miss out anything. Searching for QA Jobs Openings, check it at www.QAJobOpenings.com
Want to start a blog like this, please visit SpidyDomain to buy cheap web hosting and register domain.
- Measuring Client-side performance using Performance APIs - September 19, 2017
- Unboxing HPE LoadRunner 12.55 - August 20, 2017
- Measure Client-side Performance using Lighthouse - August 10, 2017
- Perf Calculator – free iOS app for performance testers - July 16, 2017
- How to performance test AngularJS or ReactJS applications? - June 25, 2017