First published: Thu Aug 11 2011(Updated: )
Cross-site scripting (XSS) vulnerability in agentDetect.jsp in the web UI in IBM WebSphere Service Registry and Repository (WSRR) 6.3 before 6.3.0.5, 7.0 before 7.0.0.5, and 7.5 before 7.5.0.1 allows remote attackers to inject arbitrary web script or HTML via the User-Agent HTTP header.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM WebSphere Service Registry and Repository | =7.0.0.1 | |
IBM WebSphere Service Registry and Repository | =6.3.0.4 | |
IBM WebSphere Service Registry and Repository | =6.3.0.1 | |
IBM WebSphere Service Registry and Repository | =7.0.0.4 | |
IBM WebSphere Service Registry and Repository | =7.0.0.3 | |
IBM WebSphere Service Registry and Repository | =7.0.0 | |
IBM WebSphere Service Registry and Repository | =6.3.0.2 | |
IBM WebSphere Service Registry and Repository | =7.5 | |
IBM WebSphere Service Registry and Repository | =6.3.0 | |
IBM WebSphere Service Registry and Repository | =6.3.0.3 | |
IBM WebSphere Service Registry and Repository | =7.0.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1357 has a medium severity rating due to its potential for exploitation through cross-site scripting.
To fix CVE-2011-1357, upgrade IBM WebSphere Service Registry and Repository to versions 6.3.0.5 or later, 7.0.0.5 or later, or 7.5.0.1 or later.
Versions before 6.3.0.5, 7.0.0.5, and 7.5.0.1 of IBM WebSphere Service Registry and Repository are vulnerable to CVE-2011-1357.
CVE-2011-1357 allows remote attackers to inject arbitrary web scripts or HTML into the application via the User-Agent HTTP header.
While the primary solution is to upgrade, you may mitigate risks by validating and sanitizing the User-Agent HTTP header to prevent XSS injection.