First published: Fri Apr 09 2021(Updated: )
IBM Engineering Lifecycle Optimization - Engineering Insights is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM RDNG | <=6.0.2 | |
IBM DOORS Next | <=7.0.2 | |
IBM DOORS Next | <=7.0 | |
IBM DOORS Next | <=7.0.1 | |
IBM RDNG | <=6.0.6.1 | |
IBM RDNG | <=6.0.6 | |
IBM RQM | <=6.0.6.1 | |
IBM ETM | <=7.0.1 | |
IBM RQM | <=6.0.6 | |
IBM ETM | <=7.0.0 | |
IBM RQM | <=6.0.2 | |
IBM ETM | <=7.0.2 | |
IBM RMM | <=7.0.1 | |
IBM Rhapsody Model Manager | <=6.0.6 | |
IBM RMM | <=6.0.6.1 | |
IBM Rhapsody Model Manager | <=6.0.2 | |
IBM RMM | <=6.0.6 | |
IBM Rhapsody Model Manager | <=6.0.6.1 | |
IBM RMM | <=7.0 | |
IBM RMM | <=6.0.2 | |
IBM EWM | <=7.0.1 | |
IBM RTC | <=6.0.2 | |
IBM RTC | <=6.0.6.1 | |
IBM EWM | <=7.0 | |
IBM RTC | <=6.0.6 | |
IBM EWM | <=7.0.2 | |
IBM CLM | <=6.0.6.1 | |
IBM CLM | <=6.0.6 | |
IBM ELM | <=7.0 | |
IBM CLM | <=6.0.2 | |
IBM ELM | <=7.0.1 | |
IBM ELM | <=7.0.2 | |
IBM RELM | <=6.0.6.1 | |
IBM ENI | <=7.0.1 | |
IBM RELM | <=6.0.6 | |
IBM ENI | <=7.0 | |
IBM RELM | <=6.0.2 | |
IBM ENI | <=7.0.2 | |
Ibm Collaborative Lifecycle Management | =6.0.2 | |
Ibm Collaborative Lifecycle Management | =6.0.6 | |
Ibm Collaborative Lifecycle Management | =6.0.6.1 | |
IBM DOORS Next | =7.0.0 | |
IBM DOORS Next | =7.0.1 | |
IBM DOORS Next | =7.0.2 | |
Ibm Engineering Insights | =7.0.0 | |
Ibm Engineering Insights | =7.0.1 | |
Ibm Engineering Insights | =7.0.2 | |
IBM Engineering Lifecycle Management | =7.0.0 | |
IBM Engineering Lifecycle Management | =7.0.1 | |
IBM Engineering Lifecycle Management | =7.0.2 | |
IBM Engineering Requirements Management DOORS Next | =6.0.2 | |
IBM Engineering Requirements Management DOORS Next | =6.0.6 | |
IBM Engineering Requirements Management DOORS Next | =6.0.6.1 | |
IBM Engineering Test Management | =7.0.0 | |
IBM Engineering Test Management | =7.0.1 | |
IBM Engineering Test Management | =7.0.2 | |
IBM Engineering Workflow Management | =7.0.0 | |
IBM Engineering Workflow Management | =7.0.1 | |
IBM Engineering Workflow Management | =7.0.2 | |
IBM Rational Engineering Lifecycle Manager | =6.0.2 | |
IBM Rational Engineering Lifecycle Manager | =6.0.6 | |
IBM Rational Engineering Lifecycle Manager | =6.0.6.1 | |
IBM Rational Quality Manager | =6.0.2 | |
IBM Rational Quality Manager | =6.0.6 | |
IBM Rational Quality Manager | =6.0.6.1 | |
IBM Rational Team Concert | =6.0.2 | |
IBM Rational Team Concert | =6.0.6 | |
IBM Rational Team Concert | =6.0.6.1 | |
Ibm Removable Media Management | =6.0.2 | |
Ibm Removable Media Management | =6.0.6 | |
Ibm Removable Media Management | =6.0.6.1 | |
Ibm Removable Media Management | =7.0.0 | |
Ibm Removable Media Management | =7.0.1 | |
IBM Rhapsody Model Manager | =6.0.2 | |
IBM Rhapsody Model Manager | =6.0.6 | |
IBM Rhapsody Model Manager | =6.0.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-20519 is rated as medium with a CVSS score of 5.4.
To mitigate the vulnerability, ensure to apply the latest security updates provided by IBM for the affected products.
The vulnerability could allow attackers to inject and execute arbitrary JavaScript code, potentially leading to credential disclosure within a trusted session.
You can refer to IBM's official support pages or the IBM X-Force Exchange for additional details on CVE-2021-20519.