First published: Tue Mar 12 2024(Updated: )
IBM Sterling Partner Engagement Manager 6.1.2, 6.2.0, and 6.2.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 250421.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Sterling Partner Engagement Manager on Cloud | <=6.2.2 | |
IBM Sterling Partner Engagement Manager on Cloud | <=6.1.2 | |
IBM Sterling Partner Engagement Manager on Cloud | <=6.2.0 | |
All of | ||
Any of | ||
IBM Sterling Partner Engagement Manager on Cloud | =6.1.2 | |
IBM Sterling Partner Engagement Manager on Cloud | =6.1.2 | |
IBM Sterling Partner Engagement Manager on Cloud | =6.2.0 | |
IBM Sterling Partner Engagement Manager on Cloud | =6.2.0 | |
IBM Sterling Partner Engagement Manager on Cloud | =6.2.2 | |
IBM Sterling Partner Engagement Manager on Cloud | =6.2.2 | |
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28517 is classified as a high severity cross-site scripting vulnerability.
To fix CVE-2023-28517, apply the latest security patches available for affected versions of IBM Sterling Partner Engagement Manager.
CVE-2023-28517 affects IBM Sterling Partner Engagement Manager versions 6.1.2, 6.2.0, and 6.2.2.
Exploitation of CVE-2023-28517 may lead to unauthorized embedding of JavaScript, potentially resulting in credentials disclosure.
Yes, CVE-2023-28517 affects the IBM Sterling Partner Engagement Manager on Cloud versions mentioned.