First published: Wed Feb 01 2017(Updated: )
IBM Jazz Reporting Service (JRS) is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Jazz Reporting Service | =5.0 | |
IBM Jazz Reporting Service | =5.0.1 | |
IBM Jazz Reporting Service | =5.0.2 | |
IBM Jazz Reporting Service | =6.0 | |
IBM Jazz Reporting Service | =6.0.1 | |
IBM Jazz Reporting Service | =6.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5899 has a medium severity rating due to its potential for credential disclosure and impact on trusted sessions.
To fix CVE-2016-5899, users should update to the patched versions of IBM Jazz Reporting Service 5.0.2, 6.0.1, or 6.0.2.
CVE-2016-5899 can enable cross-site scripting (XSS) attacks, allowing malicious scripts to be injected into the web interface.
CVE-2016-5899 affects IBM Jazz Reporting Service versions 5.0, 5.0.1, 6.0, 6.0.1, and 6.0.2.
Yes, user interaction is required to exploit CVE-2016-5899 as it involves executing JavaScript code through the web UI.