CA Service Management

 View Only

  • 1.  Cross Site Scripting/XSS manipulation

    Posted Oct 27, 2022 03:47 AM
    Hi All

    We patched our environment to 17.3.0.16 and are experiencing Cross Site Scripting/XSS manipulation when doing exports from Service Desk.

    I have found the below articles,
    https://knowledge.broadcom.com/external/article/241433/cross-site-scriptingxss-manipulation-exi.html

    https://techdocs.broadcom.com/us/en/ca-enterprise-software/business-management/ca-service-management/17-3/installing/installing-ca-service-management-17-3/installing-ca-service-desk-manager/securing-ca-sdm-from-cross-site-scripting-vulnerabilities.html

    https://knowledge.broadcom.com/external/article?articleId=37204

    https://knowledge.broadcom.com/external/article/36172/resolve-qbeeqref_num-cross-site-scriptin.html




    The export works when NX.env variables are configured to the local server and your login URL is that of the local server.
    However, we are configured to go via F5 for LAN and WAN in terms of Attachments and exporting

    My question is, does anybody have a solution for how to address Cross Site Scripting/XSS manipulation via F5

    Thank you
    Jacques



  • 2.  RE: Cross Site Scripting/XSS manipulation

    Posted Oct 31, 2022 03:17 AM
    Hi All

    This problem is still outstanding for me, is there anybody that can help that has F5 configured for 'EXPORTS'



    Thank you
    Jacques


  • 3.  RE: Cross Site Scripting/XSS manipulation

    Broadcom Employee
    Posted Nov 01, 2022 03:16 AM
    Hi Jacques,

    We need to look at the browser logs to ascertain the root cause. 
    Can you please support case,  so that we can have a detail look at your logs and provide a solution.



  • 4.  RE: Cross Site Scripting/XSS manipulation

    Posted Nov 02, 2022 03:37 AM

    Hi

    Thank you for your message, I have had a case (33265483) open for 9 days now, logs were taken but still waiting.

    This is becoming urgent now

    Thank you

    Jacques




  • 5.  RE: Cross Site Scripting/XSS manipulation

    Posted Nov 02, 2022 03:46 AM
    Sorry but as i see you expecting too much from support
    😃 I have 2 cases each for 3-4 months urgent and for system basic funtions

    Broadcom Support not response right
    I will never recomend it to a cutomer


    __________________________________________________________________ Disclaimer: This message and its attachment, if any, are confidential and may contain legally privileged information. If you are not the intended recipient, please contact the sender immediately and delete this message and its attachment, if any, from your system. You should not copy this message or disclose its contents to any other person or use it for any purpose. Statements and opinions expressed in this e-mail are those of the sender, and do not necessarily reflect those of Ministry of Justice (MOJ), Saudi Arabia. MOJ accepts no liability for damage caused by any virus transmitted by this email.____________________________________________________________ هذه الرسالة و مرفقاتها (إن وجدت) تمثل وثيقة سرية قد تحتوي على معلومات تتمتع بحماية وحصانة قانونية. إذا لم تكن الشخص المعني بهذه الرسالة يجب عليك تنبيه المُرسل بخطأ وصولها إليك، و حذف الرسالة و مرفقاتها (إن وجدت) من الحاسب الآلي الخاص بك. ولا يجوز لك نسخ هذه الرسالة أو مرفقاتها (إن وجدت) أو أي جزئ منها، أو البوح بمحتوياتها لأي شخص أو استعمالها لأي غرض. علماً بأن الإفادات و الآراء التي تحويها هذه الرسالة تعبر فقط عن رأي المُرسل و ليس بالضرورة رأي وزارة العـدل السعودية، ولا تتحمل وزارة العدل أي مسئولية عن الأضرار الناتجة عن أي فيروسات قد يحملها هذا البريد




  • 6.  RE: Cross Site Scripting/XSS manipulation

    Broadcom Employee
    Posted Nov 02, 2022 09:58 AM

    Ahmed, sorry to hear that you feel this way. I will reach out to you directly to help see how we can help address your concerns.

    Regards

    Charles Nack
    Product Support Manager




  • 7.  RE: Cross Site Scripting/XSS manipulation

    Posted Nov 07, 2022 01:39 AM

    Hi All

    Some feedback with regard to this issue.

    Support has provided a temp fix while they continue to investigate via engineers.

    The temp fix was to rollback previous 'export.js' as follows

    1. Take a backup of 'export.js' in "NX_ROOT\Service Desk Manager\bopcfg\www\wwwroot\scripts"
    2. Copy NX_ROOT\REPLACED\HYD-368_CUM_C.OLD\sdk\scripts\export.js to NX_ROOT\bopcfg\www\wwwroot\scripts
    3. Clean the web engine cache and browser cache and then verify the issue
    Hope this helps someone when it comes to a 'TEMP' fix