First published: Mon Jun 15 2020(Updated: )
Dijit is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the Editor's LinkDialog plugin. A remote attacker could exploit this vulnerability to inject malicious script into a Web page which would be executed in a victim's Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Openjsf Dijit | <1.11.11 | |
Openjsf Dijit | >=1.12.0<1.12.9 | |
Openjsf Dijit | >=1.13.0<1.13.8 | |
Openjsf Dijit | >=1.14.0<1.14.7 | |
Openjsf Dijit | >=1.15.0<1.15.4 | |
Openjsf Dijit | >=1.16.0<1.16.3 | |
Debian Debian Linux | =10.0 | |
Netapp Active Iq Unified Manager Vmware Vsphere | ||
Netapp Active Iq Unified Manager Windows | ||
NetApp OnCommand Insight | ||
NetApp OnCommand Workflow Automation | ||
Netapp Snapcenter | ||
IBM Cloud Pak for Automation | <=20.0.3 | |
IBM Cloud Pak for Automation | <=20.0.2 IF002 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this security issue is CVE-2020-4051.
The severity rating of CVE-2020-4051 is medium.
IBM Cognos Analytics 11.2.x and IBM Cognos Analytics 11.1.x are affected by CVE-2020-4051.
Update Dijit to versions 1.11.11, 1.12.9, 1.13.8, 1.14.7, 1.15.4, or 1.16.3 to fix CVE-2020-4051.
CVE-2020-4051 is associated with CWE-79 (Improper Neutralization of Input During Web Page Generation).