First published: Wed Feb 01 2017(Updated: )
IBM Maximo Asset Management is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Maximo Asset Management | =7.6.0.0 | |
IBM Maximo for Aviation | ||
IBM Maximo for Life Sciences | ||
IBM Maximo for Nuclear Power | ||
IBM Maximo for Oil and Gas | ||
IBM Maximo for Transportation | ||
IBM Maximo for Utilities | ||
IBM Control Desk | ||
IBM Tivoli IT Asset Management for IT | ||
IBM Tivoli Change and Configuration Management Database | ||
IBM Tivoli Integration Composer | ||
IBM Tivoli Service Request Manager |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-6072 is considered high due to its potential for credential disclosure through cross-site scripting.
To fix CVE-2016-6072, apply the latest patches and updates provided by IBM for the affected Maximo Asset Management versions.
CVE-2016-6072 affects IBM Maximo Asset Management version 7.6.0.0 and potentially other related products that share the vulnerability.
CVE-2016-6072 allows attackers to inject arbitrary JavaScript code into the web UI, potentially leading to unauthorized actions within a user's session.
Yes, user interaction is required to activate the cross-site scripting vulnerability in CVE-2016-6072.