Wednesday, August 1, 2018

IBM Security Bulletin: IBM Maximo Asset Management is affected by a cross-site scripting vulnerability. (CVE-2018-1554)

IBM Maximo Asset Management is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.

CVE(s): CVE-2018-1554

Affected product(s) and affected version(s):

This vulnerability affects the following versions of the IBM Maximo Asset Management core product, and all other IBM Maximo Industry Solution and IBM Control Desk products, regardless of their own version, if they are currently installed on top of an affected IBM Maximo Asset Management. *

Maximo Asset Management core product affected versions:

Maximo Asset Management 7.6

Industry Solutions products affected if using an affected core version:

Maximo for Aviation

Maximo for Government

Maximo for Life Sciences

Maximo for Nuclear Power

Maximo for Oil and Gas

Maximo for Transportation

Maximo for Utilities

IBM Control Desk products affected if using an affected core version:

SmartCloud Control Desk

IBM Control Desk

Tivoli Integration Composer

* To determine the core product version, log in and view System Information. The core product version is the “Tivoli’s process automation engine” version. Please consult the Product Coexistence Matrix for a list of supported product combinations.

Refer to the following reference URLs for remediation and additional vulnerability details:
Source Bulletin: https://www-01.ibm.com/support/docview.wss?uid=ibm10713695
X-Force Database: https://exchange.xforce.ibmcloud.com/vulnerabilities/142891

The post IBM Security Bulletin: IBM Maximo Asset Management is affected by a cross-site scripting vulnerability. (CVE-2018-1554) appeared first on IBM PSIRT Blog.



from IBM Product Security Incident Response Team https://ift.tt/2n3CmVm

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.