CVE-2024-28795

5.4 MEDIUM

📋 TL;DR

IBM InfoSphere Information Server 11.7 contains a cross-site scripting (XSS) vulnerability that allows attackers to inject malicious JavaScript into the web interface. This could lead to session hijacking or credential theft when users interact with compromised pages. Organizations running IBM InfoSphere Information Server 11.7 are affected.

💻 Affected Systems

Products:
  • IBM InfoSphere Information Server
Versions: 11.7
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of IBM InfoSphere Information Server 11.7 are vulnerable unless patched.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers steal administrator credentials, gain full system access, and exfiltrate sensitive data from the information server.

🟠

Likely Case

Attackers steal user session cookies or credentials, enabling unauthorized access to the InfoSphere Information Server with the victim's privileges.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts are neutralized before execution, preventing exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

XSS vulnerabilities typically require user interaction (clicking a malicious link) but are straightforward to exploit once discovered.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply fix pack 11.7.1.4 or later

Vendor Advisory: https://www.ibm.com/support/pages/node/7158408

Restart Required: Yes

Instructions:

1. Download the latest fix pack from IBM Fix Central. 2. Follow IBM's installation guide for InfoSphere Information Server 11.7 fix packs. 3. Apply the fix pack to all affected servers. 4. Restart the InfoSphere Information Server services.

🔧 Temporary Workarounds

Implement Web Application Firewall (WAF)

all

Deploy a WAF with XSS protection rules to filter malicious input before it reaches the application.

Content Security Policy (CSP)

all

Implement a strict CSP header to restrict script execution sources and prevent inline script execution.

🧯 If You Can't Patch

  • Restrict network access to the InfoSphere Information Server web interface to trusted IP addresses only.
  • Educate users about phishing risks and safe browsing practices to reduce the likelihood of clicking malicious links.

🔍 How to Verify

Check if Vulnerable:

Check the installed version of IBM InfoSphere Information Server. If it's version 11.7 without fix pack 11.7.1.4 or later, it's vulnerable.

Check Version:

Check the version via the InfoSphere Information Server web interface under Help > About, or examine installation logs.

Verify Fix Applied:

Verify that fix pack 11.7.1.4 or later is installed by checking the version in the InfoSphere Information Server administration console.

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript payloads in HTTP request logs
  • Multiple failed login attempts from unexpected locations

Network Indicators:

  • HTTP requests containing suspicious script tags or JavaScript code in parameters

SIEM Query:

search source="web_server_logs" AND ("<script>" OR "javascript:" OR "onerror=" OR "onload=")

🔗 References

📤 Share & Export