First published: Tue Mar 08 2022(Updated: )
A vulnerability has been identified in Polarion ALM (All versions < V21 R2 P2), Polarion WebClient for SVN (All versions). A cross-site scripting is present due to improper neutralization of data sent to the web page through the SVN WebClient in the affected product. An attacker could exploit this to execute arbitrary code and extract sensitive information by sending a specially crafted link to users with administrator privileges.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Polarion ALM | <21.0 | |
Siemens Polarion ALM | =21.0 | |
Siemens Polarion ALM | =21.0-r1 | |
Siemens Polarion ALM | =21.0-r2 | |
Siemens Polarion Subversion Webclient |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-44478 has been classified with a medium severity due to its potential impact via cross-site scripting attacks.
To mitigate CVE-2021-44478, it is recommended to upgrade to Polarion ALM version 21 R2 P2 or later.
All versions of Siemens Polarion ALM prior to version 21 R2 P2 are affected by CVE-2021-44478.
CVE-2021-44478 is a cross-site scripting (XSS) vulnerability related to improper data neutralization.
Yes, CVE-2021-44478 can be exploited remotely through the affected web client.