First published: Fri Aug 07 2020(Updated: )
IBM Jazz Reporting Service 6.0.6, 6.0.6.1, and 7.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 182717.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Jazz Reporting Service | <=7.0 | |
IBM Jazz Reporting Service | =6.0.6 | |
IBM Jazz Reporting Service | =6.0.6.1 | |
IBM Jazz Reporting Service | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2020-4533.
The severity level of CVE-2020-4533 is medium.
CVE-2020-4533 allows users to embed arbitrary JavaScript code in the Web UI, potentially leading to credentials disclosure within a trusted session.
Yes, IBM has provided a patch to address CVE-2020-4533. You can find the patch at: [IBM Jazz Reporting Service Patch](https://www.ibm.com/support/fixcentral/swg/selectFixes?parent=IBM%20Engineering&product=ibm/Rational/IBM+Engineering+Lifecycle+Management&release=7.0&platform=All&function=all)
You can find more information about CVE-2020-4533 at the following references: [IBM X-Force ID](https://exchange.xforce.ibmcloud.com/vulnerabilities/182717) and [IBM Support](https://www.ibm.com/support/pages/node/6257565).