CVE-2025-36135

5.4 MEDIUM

📋 TL;DR

This CVE describes a cross-site scripting (XSS) vulnerability in IBM Sterling B2B Integrator and Sterling File Gateway. An authenticated attacker can inject malicious JavaScript into the web interface, potentially stealing credentials or performing unauthorized actions within a user's trusted session. The vulnerability affects multiple versions of both products.

💻 Affected Systems

Products:
  • IBM Sterling B2B Integrator
  • IBM Sterling File Gateway
Versions: Sterling B2B Integrator 6.0.0.0 through 6.1.2.7_1, 6.2.0.0 through 6.2.0.5, and 6.2.1.0; Sterling File Gateway 6.0.0.0 through 6.1.2.7_1, 6.2.0.0 through 6.2.0.5, and 6.2.1.0
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the web interface. All default configurations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could steal administrator credentials, gain full control of the system, and potentially pivot to other systems in the network.

🟠

Likely Case

An authenticated user with malicious intent could steal session cookies or credentials from other users, leading to unauthorized access to sensitive B2B data.

🟢

If Mitigated

With proper input validation and output encoding, the attack would fail to execute malicious scripts, limiting impact to minor UI disruption.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

XSS exploitation is well-understood and requires authenticated access. No public exploit code is known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply the latest security patches from IBM. Specific version numbers are detailed in the vendor advisory.

Vendor Advisory: https://www.ibm.com/support/pages/node/7250509

Restart Required: Yes

Instructions:

1. Review IBM advisory for specific patch versions. 2. Download appropriate patches from IBM Fix Central. 3. Apply patches following IBM documentation. 4. Restart the application services. 5. Verify the fix by testing for XSS vectors.

🔧 Temporary Workarounds

Implement Content Security Policy (CSP)

all

Add a restrictive CSP header to block inline scripts and restrict script sources.

Add 'Content-Security-Policy: script-src 'self';' to web server configuration

Enable HTTPOnly and Secure cookie flags

all

Configure session cookies with HTTPOnly and Secure flags to prevent JavaScript access.

Configure in application server settings (e.g., web.xml for Java apps)

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block XSS payloads
  • Restrict network access to the web interface to trusted users only

🔍 How to Verify

Check if Vulnerable:

Test for XSS by attempting to inject script payloads into all user-input fields in the web interface.

Check Version:

Check the product version in the web interface admin panel or via product documentation methods.

Verify Fix Applied:

After patching, retest XSS vectors to confirm they are properly sanitized and no longer execute.

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript patterns in HTTP request logs
  • Multiple failed login attempts from new locations after suspicious activity

Network Indicators:

  • HTTP requests containing script tags or JavaScript functions in parameters

SIEM Query:

source="web_logs" AND (http_uri="*<script>*" OR http_uri="*javascript:*" OR http_uri="*onerror=*" OR http_uri="*onload=*")

🔗 References

📤 Share & Export