First published: Fri Oct 14 2016(Updated: )
Cross-site scripting (XSS) vulnerability in Business Space in IBM Business Process Manager 7.5 through 7.5.1.2, 8.0 through 8.0.1.3, and 8.5 before 8.5.7.0 CF2016.09 allows remote authenticated users to inject arbitrary web script or HTML via crafted content.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Business Process Manager | =7.5.0.0 | |
IBM Business Process Manager | =7.5.0.0 | |
IBM Business Process Manager | =7.5.0.0 | |
IBM Business Process Manager | =7.5.0.0 | |
IBM Business Process Manager | =7.5.0.1 | |
IBM Business Process Manager | =7.5.0.1 | |
IBM Business Process Manager | =7.5.0.1 | |
IBM Business Process Manager | =7.5.0.1 | |
IBM Business Process Manager | =7.5.1.0 | |
IBM Business Process Manager | =7.5.1.0 | |
IBM Business Process Manager | =7.5.1.0 | |
IBM Business Process Manager | =7.5.1.0 | |
IBM Business Process Manager | =7.5.1.1 | |
IBM Business Process Manager | =7.5.1.1 | |
IBM Business Process Manager | =7.5.1.1 | |
IBM Business Process Manager | =7.5.1.1 | |
IBM Business Process Manager | =7.5.1.2 | |
IBM Business Process Manager | =7.5.1.2 | |
IBM Business Process Manager | =7.5.1.2 | |
IBM Business Process Manager | =7.5.1.2 | |
IBM Business Process Manager | =8.0.0.0 | |
IBM Business Process Manager | =8.0.0.0 | |
IBM Business Process Manager | =8.0.0.0 | |
IBM Business Process Manager | =8.0.0.0 | |
IBM Business Process Manager | =8.0.1.0 | |
IBM Business Process Manager | =8.0.1.0 | |
IBM Business Process Manager | =8.0.1.0 | |
IBM Business Process Manager | =8.0.1.0 | |
IBM Business Process Manager | =8.0.1.1 | |
IBM Business Process Manager | =8.0.1.1 | |
IBM Business Process Manager | =8.0.1.1 | |
IBM Business Process Manager | =8.0.1.1 | |
IBM Business Process Manager | =8.0.1.2 | |
IBM Business Process Manager | =8.0.1.2 | |
IBM Business Process Manager | =8.0.1.2 | |
IBM Business Process Manager | =8.0.1.2 | |
IBM Business Process Manager | =8.0.1.3 | |
IBM Business Process Manager | =8.0.1.3 | |
IBM Business Process Manager | =8.0.1.3 | |
IBM Business Process Manager | =8.0.1.3 | |
IBM Business Process Manager | =8.5.0.0 | |
IBM Business Process Manager | =8.5.0.0 | |
IBM Business Process Manager | =8.5.0.0 | |
IBM Business Process Manager | =8.5.0.0 | |
IBM Business Process Manager | =8.5.0.1 | |
IBM Business Process Manager | =8.5.0.1 | |
IBM Business Process Manager | =8.5.0.1 | |
IBM Business Process Manager | =8.5.0.1 | |
IBM Business Process Manager | =8.5.0.2 | |
IBM Business Process Manager | =8.5.0.2 | |
IBM Business Process Manager | =8.5.0.2 | |
IBM Business Process Manager | =8.5.0.2 | |
IBM Business Process Manager | =8.5.5.0 | |
IBM Business Process Manager | =8.5.5.0 | |
IBM Business Process Manager | =8.5.5.0 | |
IBM Business Process Manager | =8.5.5.0 | |
IBM Business Process Manager | =8.5.6.0 | |
IBM Business Process Manager | =8.5.6.0 | |
IBM Business Process Manager | =8.5.6.0 | |
IBM Business Process Manager | =8.5.6.0 | |
IBM Business Process Manager | =8.5.6.2 | |
IBM Business Process Manager | =8.5.6.2 | |
IBM Business Process Manager | =8.5.6.2 | |
IBM Business Process Manager | =8.5.6.2 | |
IBM Business Process Manager | =8.5.7.0 | |
IBM Business Process Manager | =8.5.7.0 | |
IBM Business Process Manager | =8.5.7.0 | |
IBM Business Process Manager | =8.5.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-3056 is considered medium due to its potential impact on user data integrity and application functionality.
To fix CVE-2016-3056, you should upgrade IBM Business Process Manager to version 8.5.7.0 or later, where the vulnerability is addressed.
CVE-2016-3056 affects users of IBM Business Process Manager versions 7.5 through 8.5, including various editions like Advanced, Express, and Standard.
CVE-2016-3056 can enable cross-site scripting (XSS) attacks, allowing malicious users to inject arbitrary web scripts or HTML.
No, exploitation of CVE-2016-3056 requires administrative authentication to inject the malicious content.