Files
CVEs-PoC/2017/CVE-2017-1567.md
T
2025-09-29 21:09:30 +02:00

59 lines
4.3 KiB
Markdown

### [CVE-2017-1567](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1567)
![](https://img.shields.io/static/v1?label=Product&message=Rational%20DOORS&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=9.5%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.5.0.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.5.0.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.5.0.3%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.5.0.4%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.5.0.5%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.5.0.6%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.5.0.7%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.5.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.5.1.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.5.1.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.5.1.3%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.5.1.4%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.5.1.5%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.5.1.6%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.5.1.7%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.5.1.8%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.5.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.5.2.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.5.2.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.5.2.3%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.5.2.4%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.5.2.5%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.5.2.6%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.5.2.7%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.6%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.6.0.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.6.0.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.6.0.3%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.6.0.4%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.6.0.5%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.6.0.6%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.6.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.6.1.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.6.1.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.6.1.3%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.6.1.4%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.6.1.5%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.6.1.6%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.6.1.7%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.6.1.8%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.6.1.9%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Cross-Site%20Scripting&color=brightgreen)
### Description
IBM Doors Web Access 9.5 and 9.6 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 131769.
### POC
#### Reference
- http://www.ibm.com/support/docview.wss?uid=swg22012789
#### Github
No PoCs found on GitHub currently.