First published: Mon Jun 18 2018(Updated: )
RSA Archer, versions prior to 6.4.0.1, contain a stored cross-site scripting vulnerability. A remote authenticated malicious Archer user could potentially exploit this vulnerability to store malicious HTML or JavaScript code in a trusted application data store. When application users access the corrupted data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable web application.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
RSA Archer | >=6.1.0.0<6.1.0.3 | |
RSA Archer | >=6.2.0.0<6.2.0.10 | |
RSA Archer | >=6.3.0.0<6.3.0.7 | |
RSA Archer | =6.4.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-11059 is high with a CVSS score of 5.4.
CVE-2018-11059 affects RSA Archer versions prior to 6.4.0.1, allowing a remote authenticated malicious user to store malicious HTML or JavaScript code in a trusted application data store.
CVE-2018-11059 can be exploited by a remote authenticated malicious Archer user by storing malicious HTML or JavaScript code in a trusted application data store.
To mitigate CVE-2018-11059, it is recommended to upgrade RSA Archer to version 6.4.0.1 or later.
You can find more information about CVE-2018-11059 at the following references: [http://seclists.org/fulldisclosure/2018/Jul/69](http://seclists.org/fulldisclosure/2018/Jul/69), [http://www.securityfocus.com/bid/104892](http://www.securityfocus.com/bid/104892), [http://www.securitytracker.com/id/1041359](http://www.securitytracker.com/id/1041359).