First published: Wed Jul 27 2022(Updated: )
VISAM VBASE version 11.6.0.6 does not neutralize or incorrectly neutralizes user-controllable input before the data is placed in output used as a public-facing webpage.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
VISAM VBASE | =11.6.0.6 | |
VISAM VBASE Pro-RT/ Server-RT (Web Remote) | =11.6.0.6 |
VISAM recommends users update to VBASE v11.7.0.2 or later. Users may obtain a download link by submitting a request form. For more information, please contact VISAM using the information provided on the company contact page.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-42535 is categorized as a moderate severity vulnerability due to its potential for user-controlled input exploitation.
To fix CVE-2021-42535, ensure that all user-controllable inputs are validated and sanitized before they are used in output rendering.
CVE-2021-42535 may allow an attacker to execute cross-site scripting (XSS) attacks against users accessing the affected webpage.
CVE-2021-42535 specifically affects VISAM VBASE version 11.6.0.6.
As of now, there is no widely published patch for CVE-2021-42535, so organizations should implement input validation measures.