First published: Tue Mar 13 2012(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in IBM Maximo Asset Management and Asset Management Essentials 6.2, 7.1, and 7.5 allow remote attackers to inject arbitrary web script or HTML via the uisesionid parameter to (1) maximo.jsp or (2) the default URI under ui/.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ibm Maximo Asset Management Essentials | =6.2 | |
IBM Maximo Asset Management | =7.5 | |
Ibm Maximo Asset Management Essentials | =7.5 | |
IBM Maximo Asset Management | =7.1 | |
IBM Maximo Asset Management | =6.2 | |
Ibm Maximo Asset Management Essentials | =7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4819 allows remote attackers to execute arbitrary web scripts or HTML, potentially compromising user sessions and data.
To remediate CVE-2011-4819, upgrade to the latest versions of IBM Maximo Asset Management or apply security patches provided by IBM.
IBM Maximo Asset Management and Asset Management Essentials versions 6.2, 7.1, and 7.5 are affected by CVE-2011-4819.
While a permanent fix is recommended, limiting access to the vulnerable URIs may serve as a temporary mitigation for CVE-2011-4819.
CVE-2011-4819 is considered a medium to high risk vulnerability due to its potential for cross-site scripting attacks.