First published: Thu Jul 14 2022(Updated: )
IBM DataPower Gateway 10.0.2.0 through 10.0.4.0, 10.0.1.0 through 10.0.1.8, 10.5.0.0, and 2018.4.1.0 through 2018.4.1.21 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 228435.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM DataPower Gateway | >=10.0.1.0<=10.0.1.8 | |
IBM DataPower Gateway | >=10.0.2.0<10.5.0.1 | |
IBM DataPower Gateway | >=2018.4.1.0<=2018.4.1.21 | |
IBM DataPower Gateway | =10.5.0.0 | |
IBM DataPower Gateway V10.5.0 | <=10.5.0.0 | |
IBM DataPower Gateway V10CD | <=10.0.2.0 - 10.0.4.0 | |
IBM DataPower Gateway 10.0.1 | <=10.0.1.0 - 10.0.1.8 | |
IBM DataPower Gateway 2018.4.1 | <=2018.4.1.0 - 2018.4.1.21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-32750.
The severity level of CVE-2022-32750 is medium.
CVE-2022-32750 allows users to embed arbitrary JavaScript code in the Web UI of IBM DataPower Gateway, potentially altering its intended functionality.
IBM DataPower Gateway versions 10.0.2.0 through 10.0.4.0, 10.0.1.0 through 10.0.1.8, 10.5.0.0, and 2018.4.1.0 through 2018.4.1.21 are affected by CVE-2022-32750.
Yes, IBM has provided a fix for CVE-2022-32750. It is recommended to update to the latest version of IBM DataPower Gateway to mitigate this vulnerability.