First published: Thu Oct 07 2021(Updated: )
IBM Sterling File Gateway 2.2.0.0 through 6.1.1.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 197503.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Sterling File Gateway | >=2.2.0.0<=5.2.6.5_3 | |
IBM Sterling File Gateway | >=6.0.0.0<=6.0.0.6 | |
IBM Sterling File Gateway | >=6.0.1.0<=6.0.3.4 | |
IBM Sterling File Gateway | >=6.1.0.0<=6.1.0.1 | |
<=2.2.0.0 - 5.2.6.5_3 | ||
<=6.0.0.0 - 6.0.0.6, 6.0.1.0 - 6.0.3.4 | ||
<=6.1.0.0 - 6.1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of the IBM Sterling File Gateway vulnerability is CVE-2021-20481.
The severity of CVE-2021-20481 is medium, with a severity value of 6.1.
The affected software is IBM Sterling File Gateway versions 2.2.0.0 through 6.1.1.0.
The vulnerability allows users to embed arbitrary JavaScript code in the Web UI, potentially leading to credentials disclosure within a trusted session.
You can patch the IBM Sterling File Gateway vulnerability by applying the relevant fixes provided by IBM.