First published: Thu Jun 27 2019(Updated: )
IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 150430.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Rational Collaborative Lifecycle Management | >=6.0<=6.0.6.1 | |
IBM Rational DOORS Next Generation | >=6.0<=6.0.6.1 | |
IBM Rational Engineering Lifecycle Manager | >=6.0<=6.0.6.1 | |
IBM Rational Quality Manager | >=6.0<=6.0.6.1 | |
IBM Rational Rhapsody Design Manager | >=6.0<=6.0.6.1 | |
IBM Rational Software Architect Design Manager | >=6.0<=6.0.1 | |
IBM Rational Team Concert | >=6.0<=6.0.6.1 | |
IBM Rhapsody Model Manager | >=6.0.5<=6.0.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1827 is a vulnerability that allows users to embed arbitrary JavaScript code in the Web UI of IBM Rational Collaborative Lifecycle Management, potentially leading to credentials disclosure within a trusted session.
IBM Rational Collaborative Lifecycle Management versions 6.0 through 6.0.6.1, IBM Rational DOORS Next Generation versions 6.0 through 6.0.6.1, IBM Rational Engineering Lifecycle Manager versions 6.0 through 6.0.6.1, IBM Rational Quality Manager versions 6.0 through 6.0.6.1, IBM Rational Rhapsody Design Manager versions 6.0 through 6.0.6.1, IBM Rational Software Architect Design Manager versions 6.0 through 6.0.1, IBM Rational Team Concert versions 6.0 through 6.0.6.1, and IBM Rhapsody Model Manager versions 6.0.5 through 6.0.6.1 are affected by CVE-2018-1827.
CVE-2018-1827 has a severity level of medium with a CVSS score of 5.4.
This vulnerability allows users to embed arbitrary JavaScript code in the Web UI, enabling attackers to alter the intended functionality of the affected software.
Yes, it is recommended to update to a version that is not affected by the vulnerability.