First published: Wed Aug 31 2016(Updated: )
JBoss BPM Suite 6 is vulnerable to a reflected XSS via dashbuilder. Remote attackers can entice authenticated users that have privileges to access dashbuilder (usually admins) to click on links to /dashbuilder/Controller containing malicious scripts. Successful exploitation would allow execution of script code within the context of the affected user.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat JBoss BPM suite | >=6.0.0<6.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6343 is considered a high severity vulnerability due to its potential for reflected cross-site scripting (XSS) attacks.
To mitigate CVE-2016-6343, upgrade to a version of JBoss BPM Suite that is not vulnerable, specifically version 6.4.3 or later.
CVE-2016-6343 affects authenticated users with access to the dashbuilder component in JBoss BPM Suite 6 versions 6.0.0 through 6.4.2.
Reflected XSS, as seen in CVE-2016-6343, occurs when attackers trick users into clicking on malicious links that execute scripts in a web application without being stored on the server.
Yes, CVE-2016-6343 impacts all versions of JBoss BPM Suite from 6.0.0 to 6.4.2.