First published: Sat Oct 08 2011(Updated: )
Cross-site scripting (XSS) vulnerability in Novell Identity Manager (aka IDM) User Application 3.5.0, 3.5.1, 3.6.0, 3.6.1, 3.7.0, and 4.0.0, and Identity Manager Roles Based Provisioning Module 3.6.0, 3.6.1, 3.7.0, and 4.0.0, allows remote attackers to inject arbitrary web script or HTML via the apwaDetail (aka apwaDetailId) parameter, aka Bug 692972.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell Identity Manager Roles Based Provisioning Module | =3.6.0 | |
Novell Identity Manager Roles Based Provisioning Module | =3.6.1 | |
Novell Identity Manager Roles Based Provisioning Module | =4.0.0 | |
Novell Identity Manager Roles Based Provisioning Module | =3.7.0 | |
Novell Identity Manager User Application | =3.5.1 | |
Novell Identity Manager User Application | =4.0.0 | |
Novell Identity Manager User Application | =3.6.0 | |
Novell Identity Manager User Application | =3.6.1 | |
Novell Identity Manager User Application | =3.5.0 | |
Novell Identity Manager User Application | =3.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1696 is classified as a medium severity cross-site scripting vulnerability.
To fix CVE-2011-1696, upgrade your Novell Identity Manager User Application or Roles Based Provisioning Module to a patched version.
CVE-2011-1696 affects Novell Identity Manager User Application versions 3.5.0, 3.5.1, 3.6.0, 3.6.1, 3.7.0, and 4.0.0, as well as Roles Based Provisioning Module versions 3.6.0, 3.6.1, 3.7.0, and 4.0.0.
The impact of CVE-2011-1696 allows attackers to inject arbitrary web script or HTML, leading to potential unauthorized actions on behalf of users.
There are no official workarounds for CVE-2011-1696; the recommended action is to apply the necessary updates.