First published: Mon May 27 2024(Updated: )
IBM Engineering Workflow Management 7.0.2 and 7.0.3 is vulnerable to stored cross-site scripting. Under certain configurations, this vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 286830.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Engineering Workflow Management (EWM) | <=7.0.2 | |
IBM Engineering Workflow Management (EWM) | <=7.0.3 | |
All of | ||
Any of | ||
IBM Engineering Workflow Management (EWM) | =7.0.2 | |
IBM Engineering Workflow Management (EWM) | =7.0.3 | |
Any of | ||
Linux Kernel | ||
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-28793 is considered a medium severity vulnerability due to the potential for stored cross-site scripting attacks.
To fix CVE-2024-28793, update IBM Engineering Workflow Management to the latest version beyond 7.0.3 and implement proper input validation.
The risks of CVE-2024-28793 include unauthorized execution of JavaScript code which can lead to session hijacking and credential theft.
IBM Engineering Workflow Management versions 7.0.2 and 7.0.3 are affected by CVE-2024-28793.
Yes, CVE-2024-28793 can be exploited remotely by attackers who can input malicious scripts via the application’s web interface.