First published: Wed Jul 05 2017(Updated: )
IBM Jazz Reporting Service (JRS) 5.0 and 6.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 120656.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Jazz Reporting Service | =5.0 | |
IBM Jazz Reporting Service | =5.0.1 | |
IBM Jazz Reporting Service | =5.0.2 | |
IBM Jazz Reporting Service | =6.0 | |
IBM Jazz Reporting Service | =6.0.1 | |
IBM Jazz Reporting Service | =6.0.2 | |
IBM Jazz Reporting Service | =6.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-1096 is considered a medium severity vulnerability due to its potential for cross-site scripting attacks.
To fix CVE-2017-1096, upgrade to the latest version of IBM Jazz Reporting Service that addresses the cross-site scripting vulnerability.
CVE-2017-1096 affects IBM Jazz Reporting Service versions 5.0, 5.0.1, 5.0.2, 6.0, 6.0.1, 6.0.2, and 6.0.3.
The risks associated with CVE-2017-1096 include the potential for credentials disclosure and unauthorized actions within a trusted session through injected JavaScript.
Yes, exploitation of CVE-2017-1096 requires the attacker to already be authenticated within the application.