First published: Mon Jul 27 2020(Updated: )
IBM Engineering Workflow Management is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Engineering Workflow Management | =7.0.0 | |
IBM Rational Rhapsody Design Manager | =6.0.2 | |
IBM Rational Rhapsody Design Manager | =7.0.0 | |
<=6.0.6.1 | ||
<=6.0.6 | ||
<=7.0.0 | ||
<=6.0.2 | ||
<=7.0 | ||
<=6.0.6.1 | ||
<=6.0.6 | ||
<=7.0 | ||
<=6.0.2 | ||
<=6.0.2 | ||
<=6.0.6.1 | ||
<=6.0.6 | ||
<=7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-4525.
The severity level of CVE-2020-4525 is medium.
IBM Engineering Workflow Management, RQM, ETM, EWM, CLM, ELM, RDNG, and DOORS Next are affected by CVE-2020-4525.
This vulnerability allows users to embed arbitrary JavaScript code in the Web UI, potentially leading to credentials disclosure within a trusted session.
You can find more information about CVE-2020-4525 [here](https://exchange.xforce.ibmcloud.com/vulnerabilities/182435) and [here](https://www.ibm.com/support/pages/node/6255694).