CVE-2014-0824CVE-2014-0824

Affected configuration(s):

cpe:/a:ibm:change_and_configuration_management_database:7.0
cpe:/a:ibm:change_and_configuration_management_database:7.1
cpe:/a:ibm:change_and_configuration_management_database:7.1.1.7
cpe:/a:ibm:change_and_configuration_management_database:7.1.1.8
cpe:/a:ibm:change_and_configuration_management_database:7.1.1.12
cpe:/a:ibm:maximo_asset_management:7.1
cpe:/a:ibm:maximo_asset_management:7.1.1
cpe:/a:ibm:maximo_asset_management:7.1.1.1
cpe:/a:ibm:maximo_asset_management:7.1.1.2
cpe:/a:ibm:maximo_asset_management:7.1.1.5
cpe:/a:ibm:maximo_asset_management:7.1.1.6
cpe:/a:ibm:maximo_asset_management:7.1.1.7
cpe:/a:ibm:maximo_asset_management:7.1.1.8
cpe:/a:ibm:maximo_asset_management:7.1.1.12
cpe:/a:ibm:maximo_service_desk:7.1.1.7
cpe:/a:ibm:maximo_service_desk:7.1.1.8
cpe:/a:ibm:maximo_service_desk:7.1.1.12
cpe:/a:ibm:tivoli_it_asset_management_for_it:7.1.1.7
cpe:/a:ibm:tivoli_it_asset_management_for_it:7.1.1.8
cpe:/a:ibm:tivoli_it_asset_management_for_it:7.1.1.12
cpe:/a:ibm:tivoli_service_request_manager:7.0
cpe:/a:ibm:tivoli_service_request_manager:7.1.0
cpe:/a:ibm:tivoli_service_request_manager:7.1.1
cpe:/a:ibm:tivoli_service_request_manager:7.1.1.7
cpe:/a:ibm:tivoli_service_request_manager:7.1.1.8
cpe:/a:ibm:tivoli_service_request_manager:7.1.1.12

Date published: 2014-05-26T12:55:03.067-04:00

Date last modified: 2017-08-28T21:34:15.780-04:00

CVSS Score: 3.5

Principal attack vector: NETWORK

Complexity:  MEDIUM

Reference URL: http://www-01.ibm.com/support/docview.wss?uid=swg1IV52829

Summary: Cross-site scripting (XSS) vulnerability in IBM Maximo Asset Management 7.x before 7.1.1.8 LAFIX.20140319-0839 and 7.1.1.12 before IFIX.20140321-1336 and Tivoli IT Asset Management for IT, Tivoli Service Request Manager, Maximo Service Desk, and Change and Configuration Management Database (CCMDB) 7.x before 7.1.1.8 LAFIX.20140319-0839 and 7.1.1.12 before IFIX.20140218-1510 allows remote authenticated users to inject arbitrary web script or HTML via an attachment URL.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.