Hi,
TS 552 SP3 Solaris
My Security colleagues in Japan found a Cross-Site Scripting (XSS) Vulnerability in TeamSite whilst doing the annual penetration tests last year.
Examples of the vulnerability are below:-
http://iwserver/iw/webdesk/login?done_page=/iw/webdesk/loggedin"><script>alert(document.cookie) </script>
or
http://iwserver/iw/webdesk/login?done_page=/iw/webdesk/loggedin"><script>alert("Hello World!") </script>
Whilst interwoven agree that a vulnerability may exist they will not issue a bug because they 'cannot think of anything that would compromise TeamSite or the client since the information that's available will always be client side based'.
I agree with their stance in part (I cannot think of a scenario how the vulnerability may be exploited), however, I find it rather surprising that a vendor accepts the existence of a security bug but will not fix it. Surely the whole issue of the severity of a vulnerability is open to interpretation and exploitation and thus risk.
I suppose I’m posting this because I’m in a position where I find Interwoven’s position difficult to defend and would like to know if any other person/company has any experience in XSS vulnerabilities in TeamSite (or any other application) and if they have a more relaxed security policy regarding such a vulnerability?
Is the client being too ruthless in assuming if any security vulnerability is found it needs to be fixed?
Any help/experience on the issue would be much appreciated.
Steve.
Steve North
Interwoven Consultant
Sony - Europe