First published: Wed Feb 01 2017(Updated: )
IBM Tivoli Storage Manager Operations Center is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Tivoli Storage Manager | =6.4.1 | |
IBM Tivoli Storage Manager | =6.4.1.1 | |
IBM Tivoli Storage Manager | =6.4.2 | |
IBM Tivoli Storage Manager | =6.4.2.1 | |
IBM Tivoli Storage Manager | =6.4.2.2 | |
IBM Tivoli Storage Manager | =6.4.2.3 | |
IBM Tivoli Storage Manager | =6.4.2.4 | |
IBM Tivoli Storage Manager | =7.1 | |
IBM Tivoli Storage Manager | =7.1.0.1 | |
IBM Tivoli Storage Manager | =7.1.0.2 | |
IBM Tivoli Storage Manager | =7.1.1.1 | |
IBM Tivoli Storage Manager | =7.1.1.2 | |
IBM Tivoli Storage Manager | =7.1.3 | |
IBM Tivoli Storage Manager | =7.1.3.1 | |
IBM Tivoli Storage Manager | =7.1.3.2 | |
IBM Tivoli Storage Manager | =7.1.4 | |
IBM Tivoli Storage Manager | =7.1.4.1 | |
IBM Tivoli Storage Manager | =7.1.4.2 | |
IBM Tivoli Storage Manager | =7.1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6046 is classified as a moderate severity vulnerability due to its potential for credential disclosure.
To fix CVE-2016-6046, upgrade to the latest version of IBM Tivoli Storage Manager that addresses the cross-site scripting vulnerability.
CVE-2016-6046 affects IBM Tivoli Storage Manager versions 6.4.1, 6.4.2, and 7.1 among others.
Yes, CVE-2016-6046 can potentially lead to data theft by allowing arbitrary JavaScript code execution, which could disclose user credentials.
CVE-2016-6046 is considered a remote vulnerability as it can be exploited through the web interface.