Priority vulnerability associated with SiteMinder, related to the following
Release : R12.52 webagents
As we can see in the URLs that were reported, they all go to the same path, /siteminderagent/forms/smpwservices.fcc.
The main difference is the parameter where the payload goes, but they are both related to password services.
In such cases, the problem is that the input that is entered on the USERNAME parameter is entered directly into the DOM with the method document.write(), which is inherently susceptible to XSS as it can insert HTML and JavaScript into the DOM. We can see that in the HTTP response for any of the reported URLs.
->Add the following the Agent Configuration Object (ACO)
FCCHTMLEncoding = no
FCCHTMLEncodingChars = %22,%26,%27,%3c,%3e,%5c
-> Rerun the vulnerability scan and report to Broadcom support to assist further on this vulnerability.
###### REFERENCES ######
https://techdocs.broadcom.com/us/en/symantec-security-software/identity-security/siteminder/12-8/configuring/web-agent-configuration/user-protection/help-prevent-attacks.html