First published: Tue Jul 03 2018(Updated: )
IBM Rational Quality Manager and IBM Rational Collaborative Lifecycle Management 5.0 through 5.0.2 and 6.0 through 6.0.5 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 125161.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Rational Quality Manager | =5.0.0 | |
IBM Rational Quality Manager | =5.0.1 | |
IBM Rational Quality Manager | =5.0.2 | |
IBM Rational Quality Manager | =6.0.0 | |
IBM Rational Quality Manager | =6.0.1 | |
IBM Rational Quality Manager | =6.0.2 | |
IBM Rational Quality Manager | =6.0.3 | |
IBM Rational Quality Manager | =6.0.4 | |
IBM Rational Quality Manager | =6.0.5 | |
IBM Collaborative Lifecycle Management | =5.0.0 | |
IBM Collaborative Lifecycle Management | =5.0.1 | |
IBM Collaborative Lifecycle Management | =5.0.2 | |
IBM Collaborative Lifecycle Management | =6.0.0 | |
IBM Collaborative Lifecycle Management | =6.0.1 | |
IBM Collaborative Lifecycle Management | =6.0.2 | |
IBM Collaborative Lifecycle Management | =6.0.3 | |
IBM Collaborative Lifecycle Management | =6.0.4 | |
IBM Collaborative Lifecycle Management | =6.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-1299 is rated as a moderate severity vulnerability due to its potential for cross-site scripting attacks that may compromise user security.
To fix CVE-2017-1299, update your IBM Rational Quality Manager or IBM Rational Collaborative Lifecycle Management to versions 5.0.3 or 6.0.6 or later.
CVE-2017-1299 affects IBM Rational Quality Manager versions 5.0.0 to 5.0.2 and 6.0.0 to 6.0.5, as well as IBM Rational Collaborative Lifecycle Management versions 5.0.0 to 5.0.2 and 6.0.0 to 6.0.5.
CVE-2017-1299 enables cross-site scripting (XSS) attacks that allow users to embed arbitrary JavaScript code in the web interface.
While upgrading is the recommended solution for CVE-2017-1299, limiting user permissions and input validation can serve as temporary workarounds.