First published: Wed Feb 01 2017(Updated: )
IBM Maximo Asset Management is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Maximo Asset Management | =7.6.0.0 | |
Ibm Maximo For Aviation | ||
Ibm Maximo For Life Sciences | ||
Ibm Maximo For Nuclear Power | ||
Ibm Maximo For Oil And Gas | ||
Ibm Maximo For Transportation | ||
Ibm Maximo For Utilities | ||
IBM SmartCloud Control Desk | ||
IBM Tivoli Asset Management for IT | ||
IBM Tivoli Change and Configuration Management Database | ||
IBM Maximo Asset Management | ||
Ibm Tivoli Service Request Manager |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-6072 is considered high due to its potential for credential disclosure through cross-site scripting.
To fix CVE-2016-6072, apply the latest patches and updates provided by IBM for the affected Maximo Asset Management versions.
CVE-2016-6072 affects IBM Maximo Asset Management version 7.6.0.0 and potentially other related products that share the vulnerability.
CVE-2016-6072 allows attackers to inject arbitrary JavaScript code into the web UI, potentially leading to unauthorized actions within a user's session.
Yes, user interaction is required to activate the cross-site scripting vulnerability in CVE-2016-6072.