First published: Mon Jul 13 2020(Updated: )
IBM QRadar is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM QRadar Security Information and Event Manager | >=7.3.0<=7.3.2 | |
IBM QRadar Security Information and Event Manager | =7.3.3 | |
IBM QRadar Security Information and Event Manager | =7.3.3-p1 | |
IBM QRadar Security Information and Event Manager | =7.3.3-p2 | |
IBM QRadar Security Information and Event Manager | =7.3.3-p3 | |
IBM QRadar Security Information and Event Manager | =7.4.0 | |
IBM QRadar Security Information and Event Manager | =7.4.0-p1 | |
IBM QRadar Security Information and Event Manager | =7.4.0-p2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-4513 is a vulnerability in IBM QRadar SIEM 7.3 and 7.4 that allows users to embed arbitrary JavaScript code in the Web UI, potentially leading to credentials disclosure.
CVE-2020-4513 affects IBM QRadar SIEM 7.3 and 7.4, allowing users to inject malicious JavaScript code into the Web UI and potentially disclose credentials within a trusted session.
CVE-2020-4513 has a severity score of 6.1, which is considered medium.
IBM QRadar SIEM versions 7.3.0 to 7.3.2, 7.3.3, 7.4.0, and their corresponding maintenance releases (if applicable) are affected by CVE-2020-4513.
To fix CVE-2020-4513, IBM provides patch updates for the affected versions of IBM QRadar SIEM. It is recommended to upgrade to the latest version and apply the necessary patches.