First published: Wed Jan 23 2019(Updated: )
A vulnerability in the one-x Portal component of IP Office could allow an authenticated user to perform stored cross site scripting attacks via fields in the Conference Scheduler Service that could affect other application users. Affected versions of IP Office include 10.0 through 10.1 SP3 and 11.0 versions prior to 11.0 SP1.
Credit: securityalerts@avaya.com
Affected Software | Affected Version | How to fix |
---|---|---|
=10.0 | ||
=10.0-sp1 | ||
=10.0-sp2 | ||
=10.0-sp3 | ||
=10.0-sp4 | ||
=10.0-sp5 | ||
=10.0-sp6 | ||
=10.0-sp7 | ||
=10.1 | ||
=10.1-sp1 | ||
=10.1-sp2 | ||
=10.1-sp3 | ||
=11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-15614 has a medium severity rating due to the potential for stored cross-site scripting attacks.
To fix CVE-2018-15614, update your Avaya IP Office software to the latest patched version that addresses this vulnerability.
Avaya IP Office versions 10.0 to 11.0 are affected by CVE-2018-15614.
CVE-2018-15614 allows an authenticated user to perform stored cross-site scripting attacks.
Users of the affected versions of Avaya IP Office could be impacted, as the vulnerability may affect other application users.