First published: Sun Oct 22 2023(Updated: )
IBM Sterling Partner Engagement Manager 6.1.2, 6.2.0, and 6.2.2 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 262174.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Sterling Partner Engagement Manager | =6.1.2 | |
IBM Sterling Partner Engagement Manager | =6.1.2 | |
IBM Sterling Partner Engagement Manager | =6.2.0 | |
IBM Sterling Partner Engagement Manager | =6.2.0 | |
IBM Sterling Partner Engagement Manager | =6.2.2 | |
IBM Sterling Partner Engagement Manager | =6.2.2 | |
<=6.1.2, 6.2.0, 6.2.2 | ||
<=6.1.2, 6.2.0, 6.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2023-38722.
The severity of CVE-2023-38722 is medium (6.4).
IBM Sterling Partner Engagement Manager 6.1.2, 6.2.0, and 6.2.2 are affected by this vulnerability.
To fix CVE-2023-38722, apply the patch provided by IBM, which can be found at the following URL: [Patch URL](https://www.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm%7EOther%20software&product=ibm/Other+software/IBM+Sterling+Partner+Engagement+Manager+Software&release=6.2.2.1&platform=All&function=fixId&fixids=IBM_PEM_Essentials_6.2.2.1.2&includeSupersedes=0).
The Common Weakness Enumeration (CWE) ID for this vulnerability is CWE-79.