First published: Tue Mar 13 2012(Updated: )
Open redirect vulnerability in IBM Maximo Asset Management and Asset Management Essentials 6.2, 7.1, and 7.5 allows remote authenticated users to redirect users to arbitrary web sites and conduct phishing attacks via the uisessionid parameter to an unspecified component.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Maximo Asset Management | =6.2 | |
IBM Maximo Asset Management | =7.1 | |
IBM Maximo Asset Management | =7.5 | |
Ibm Maximo Asset Management Essentials | =6.2 | |
Ibm Maximo Asset Management Essentials | =7.1 | |
Ibm Maximo Asset Management Essentials | =7.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4818 is classified as a medium severity vulnerability due to its potential for phishing attacks.
To mitigate CVE-2011-4818, it's recommended to update to the latest version of IBM Maximo Asset Management or apply any available patches.
CVE-2011-4818 affects users of IBM Maximo Asset Management and IBM Maximo Asset Management Essentials versions 6.2, 7.1, and 7.5.
CVE-2011-4818 can enable attackers to perform open redirect attacks, potentially leading to phishing and social engineering attacks.
Yes, the exploitation of CVE-2011-4818 requires remote authenticated users to manipulate the uisessionid parameter.