First published: Wed Jun 17 2020(Updated: )
IBM DOORS Next Generation (DNG/RRC) 6.0.2, 6.0.6, 6.0.6.1, and 7.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 176408.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM DOORS Next | =7.0 | |
IBM Rational DOORS Next Generation | =6.0.2 | |
IBM Rational DOORS Next Generation | =6.0.6 | |
IBM Rational DOORS Next Generation | =6.0.6.1 | |
<=6.0.2 | ||
<=6.0.6.1 | ||
<=6.0.6 | ||
<=7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
IBM DOORS Next Generation (DNG/RRC) 6.0.2, 6.0.6, 6.0.6.1, and 7.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI, potentially leading to credentials disclosure within a trusted session.
The vulnerability allows an attacker to embed malicious JavaScript code in the Web UI, which can alter the intended functionality of the application and potentially result in credentials disclosure.
The severity level of vulnerability CVE-2020-4295 is medium, with a CVSS score of 5.4.
Versions 6.0.2, 6.0.6, 6.0.6.1, and 7.0 of IBM DOORS Next Generation (DNG/RRC) are affected by vulnerability CVE-2020-4295.
To mitigate the vulnerability CVE-2020-4295, IBM recommends applying the necessary fix packs or upgrading to a fixed version. Please refer to the IBM support page for detailed instructions and patches.