First published: Fri Jun 18 2021(Updated: )
IBM Sterling Connect:Direct Browser User Interface 1.4.1.1 and 1.5.0.2 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim. IBM X-Force ID: 199229.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Sterling Connect:Direct | =1.4.1.1 | |
IBM Sterling Connect:Direct | =1.5.0.2 | |
HPE HP-UX | ||
IBM AIX | ||
Linux Kernel | ||
Microsoft Windows | ||
Oracle Solaris SPARC | ||
IBM Sterling Connect:Direct | <=1.5.0.2 | |
IBM Sterling Connect:Direct | <=1.4.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-20560 is classified as a medium severity vulnerability.
To fix CVE-2021-20560, you should upgrade to IBM Sterling Connect:Direct Browser User Interface versions 1.4.1.2 or 1.5.0.3 or later.
CVE-2021-20560 affects users of IBM Sterling Connect:Direct Browser User Interface versions 1.4.1.1 and 1.5.0.2.
CVE-2021-20560 facilitates clickjacking attacks that can allow a remote attacker to hijack user actions.
Yes, CVE-2021-20560 can be exploited remotely if a user visits a malicious website.