First published: Wed Aug 05 2020(Updated: )
IBM Jazz Reporting Service 6.0.2, 6.0.6, 6.0.6.1, 7.0, and 7.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Jazz Reporting Service | <=7.0.1 | |
IBM Jazz Reporting Service | <=7.0 | |
IBM Jazz Reporting Service | <=6.0.6.1 | |
IBM Jazz Reporting Service | <=6.0.6 | |
IBM Jazz Reporting Service | <=6.0.2 | |
IBM Jazz Reporting Service | =6.0.2 | |
IBM Jazz Reporting Service | =6.0.6 | |
IBM Jazz Reporting Service | =6.0.6.1 | |
IBM Jazz Reporting Service | =7.0 | |
IBM Jazz Reporting Service | =7.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-4539.
The severity of CVE-2020-4539 is medium.
IBM Jazz Reporting Service versions 6.0.2, 6.0.6, 6.0.6.1, 7.0, and 7.0.1 are affected by CVE-2020-4539.
CVS-2020-4539 allows users to embed arbitrary JavaScript code in the Web UI of IBM Jazz Reporting Service, potentially leading to credentials disclosure within a trusted session.
To fix CVE-2020-4539, you can apply the necessary patches provided by IBM, which can be found in the IBM support page.