First published: Sat Apr 27 2013(Updated: )
Cross-site scripting (XSS) vulnerability in IBM Document Connect for Application Support Facility (aka DC4ASF) before 1.0.0.1218 in Application Support Facility (ASF) 3.4 for z/OS on Windows, Linux, and AIX allows remote authenticated users to inject content, and conduct phishing attacks, via unspecified vectors.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Application Support Facility | =3.4.0 | |
IBM Application Support Facility | =3.4.0 | |
IBM Application Support Facility | =3.4.0 | |
IBM Application Support Facility | =3.4.0 | |
IBM Document Connect for Application Support Facility | <=1.0.0.1204 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0572 is classified as a moderate severity cross-site scripting (XSS) vulnerability.
To remediate CVE-2013-0572, upgrade IBM Document Connect for Application Support Facility to version 1.0.0.1218 or later.
CVE-2013-0572 affects users of IBM Document Connect and Application Support Facility version 3.4.0 on z/OS, Windows, Linux, and AIX.
CVE-2013-0572 can enable remote authenticated users to inject malicious content, leading to phishing attacks.
Yes, exploitation of CVE-2013-0572 requires the attacker to be an authenticated user.