First published: Sun Jul 03 2016(Updated: )
Cross-site scripting (XSS) vulnerability in IBM WebSphere Commerce 6.0 through 6.0.0.11, 7.0 before 7.0.0.9 cumulative iFix 3, and 8.0 before 8.0.0.5 allows remote attackers to inject arbitrary web script or HTML via a crafted URL.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM WebSphere Commerce | =6.0.0.0 | |
IBM WebSphere Commerce | =6.0.0.1 | |
IBM WebSphere Commerce | =6.0.0.2 | |
IBM WebSphere Commerce | =6.0.0.3 | |
IBM WebSphere Commerce | =6.0.0.4 | |
IBM WebSphere Commerce | =6.0.0.5 | |
IBM WebSphere Commerce | =6.0.0.6 | |
IBM WebSphere Commerce | =6.0.0.7 | |
IBM WebSphere Commerce | =6.0.0.8 | |
IBM WebSphere Commerce | =6.0.0.9 | |
IBM WebSphere Commerce | =6.0.0.10 | |
IBM WebSphere Commerce | =6.0.0.11 | |
IBM WebSphere Commerce | =7.0 | |
IBM WebSphere Commerce | =7.0.0.1 | |
IBM WebSphere Commerce | =7.0.0.2 | |
IBM WebSphere Commerce | =7.0.0.3 | |
IBM WebSphere Commerce | =7.0.0.4 | |
IBM WebSphere Commerce | =7.0.0.5 | |
IBM WebSphere Commerce | =7.0.0.6 | |
IBM WebSphere Commerce | =7.0.0.7 | |
IBM WebSphere Commerce | =7.0.0.8 | |
IBM WebSphere Commerce | =7.0.0.9 | |
IBM WebSphere Commerce | =8.0.0.0 | |
IBM WebSphere Commerce | =8.0.0.1 | |
IBM WebSphere Commerce | =8.0.0.2 | |
IBM WebSphere Commerce | =8.0.0.3 | |
IBM WebSphere Commerce | =8.0.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-2862 is considered medium due to its potential for exploitation via XSS attacks.
To fix CVE-2016-2862, update your IBM WebSphere Commerce to the latest version or apply the cumulative iFix for your specific version.
CVE-2016-2862 affects IBM WebSphere Commerce versions 6.0 through 6.0.0.11, 7.0 before 7.0.0.9 cumulative iFix 3, and 8.0 before 8.0.0.5.
CVE-2016-2862 is a Cross-Site Scripting (XSS) vulnerability that allows attackers to inject arbitrary web scripts or HTML.
Yes, CVE-2016-2862 can be exploited remotely, allowing attackers to execute arbitrary scripts on affected systems.