cnvd-2016-07415
Vulnerability from cnvd
Title: 多款IBM产品跨站脚本漏洞(CNVD-2016-07415)
Description:
IBM Rational Collaborative Lifecycle Management(CLM)等都是美国IBM公司的产品。IBM Rational CLM、Rational Team Concert(RTC)和Rational Engineering Lifecycle Manager都是协作化生命周期管理解决方案;Rational Quality Manager(RQM)是一套协作的、基于Web的质量管理解决方案;Rational Requirements Composer和Rational DOORS Next Generation都是需求管理解决方案。
多款IBM产品中存在跨站脚本漏洞。远程攻击者可以该漏洞执行任意JavaScript代码。基于IBM Jazz Team Server的以下产品和版本受到影响:Rational Collaborative Lifecycle Management 6.0.1、6.0.2;Rational Quality Manager 6.0.1 - 6.0.2;Rational Team Concert 6.0.1、6.0.2;Rational DOORS Next Generation 6.0.1、6.0.2;Rational Engineering Lifecycle Manager 6.0.1、6.0.2;Rational Rhapsody Design Manager 6.0.1、6.0.2。
Severity: 中
Patch Name: 多款IBM产品跨站脚本漏洞(CNVD-2016-07415)的补丁
Patch Description:
IBM Rational Collaborative Lifecycle Management(CLM)等都是美国IBM公司的产品。IBM Rational CLM、Rational Team Concert(RTC)和Rational Engineering Lifecycle Manager都是协作化生命周期管理解决方案;Rational Quality Manager(RQM)是一套协作的、基于Web的质量管理解决方案;Rational Requirements Composer和Rational DOORS Next Generation都是需求管理解决方案。
多款IBM产品中存在跨站脚本漏洞。远程攻击者可以该漏洞执行任意JavaScript代码。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接: http://www-01.ibm.com/support/docview.wss?uid=swg21989940
Reference: http://www.securityfocus.com/bid/92869 http://www-01.ibm.com/support/docview.wss?uid=swg21989940
Name | ['IBM Rational Collaborative Lifecycle Management 6.0.2', 'IBM Rational Collaborative Lifecycle Management 6.0.1', 'IBM Rational Team Concert 6.0.2', 'IBM Rational Team Concert 6.0.1', 'IBM Rational Engineering Lifecycle Manager 6.0.1', 'IBM Rational Engineering Lifecycle Manager 6.0.2', 'IBM Rational Rhapsody Design Manager 6.0.1', 'IBM Rational Rhapsody Design Manager 6.0.2', 'IBM Rational DOORS Next Generation 6.0.2', 'IBM Rational DOORS Next Generation 6.0.1', 'IBM Rational Quality Manager 6.0.2', 'IBM Rational Quality Manager 6.0.1'] |
---|
{ "bids": { "bid": { "bidNumber": "92869" } }, "cves": { "cve": { "cveNumber": "CVE-2016-2986" } }, "description": "IBM Rational Collaborative Lifecycle Management\uff08CLM\uff09\u7b49\u90fd\u662f\u7f8e\u56fdIBM\u516c\u53f8\u7684\u4ea7\u54c1\u3002IBM Rational CLM\u3001Rational Team Concert\uff08RTC\uff09\u548cRational Engineering Lifecycle Manager\u90fd\u662f\u534f\u4f5c\u5316\u751f\u547d\u5468\u671f\u7ba1\u7406\u89e3\u51b3\u65b9\u6848\uff1bRational Quality Manager\uff08RQM\uff09\u662f\u4e00\u5957\u534f\u4f5c\u7684\u3001\u57fa\u4e8eWeb\u7684\u8d28\u91cf\u7ba1\u7406\u89e3\u51b3\u65b9\u6848\uff1bRational Requirements Composer\u548cRational DOORS Next Generation\u90fd\u662f\u9700\u6c42\u7ba1\u7406\u89e3\u51b3\u65b9\u6848\u3002\r\n\r\n\u591a\u6b3eIBM\u4ea7\u54c1\u4e2d\u5b58\u5728\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u4ee5\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610fJavaScript\u4ee3\u7801\u3002\u57fa\u4e8eIBM Jazz Team Server\u7684\u4ee5\u4e0b\u4ea7\u54c1\u548c\u7248\u672c\u53d7\u5230\u5f71\u54cd\uff1aRational Collaborative Lifecycle Management 6.0.1\u30016.0.2\uff1bRational Quality Manager 6.0.1 - 6.0.2\uff1bRational Team Concert 6.0.1\u30016.0.2\uff1bRational DOORS Next Generation 6.0.1\u30016.0.2\uff1bRational Engineering Lifecycle Manager 6.0.1\u30016.0.2\uff1bRational Rhapsody Design Manager 6.0.1\u30016.0.2\u3002", "discovererName": "IBM", "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6b64\u5b89\u5168\u95ee\u9898\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a \r\nhttp://www-01.ibm.com/support/docview.wss?uid=swg21989940", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2016-07415", "openTime": "2016-09-12", "patchDescription": "IBM Rational Collaborative Lifecycle Management\uff08CLM\uff09\u7b49\u90fd\u662f\u7f8e\u56fdIBM\u516c\u53f8\u7684\u4ea7\u54c1\u3002IBM Rational CLM\u3001Rational Team Concert\uff08RTC\uff09\u548cRational Engineering Lifecycle Manager\u90fd\u662f\u534f\u4f5c\u5316\u751f\u547d\u5468\u671f\u7ba1\u7406\u89e3\u51b3\u65b9\u6848\uff1bRational Quality Manager\uff08RQM\uff09\u662f\u4e00\u5957\u534f\u4f5c\u7684\u3001\u57fa\u4e8eWeb\u7684\u8d28\u91cf\u7ba1\u7406\u89e3\u51b3\u65b9\u6848\uff1bRational Requirements Composer\u548cRational DOORS Next Generation\u90fd\u662f\u9700\u6c42\u7ba1\u7406\u89e3\u51b3\u65b9\u6848\u3002\r\n\r\n\u591a\u6b3eIBM\u4ea7\u54c1\u4e2d\u5b58\u5728\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u4ee5\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610fJavaScript\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "\u591a\u6b3eIBM\u4ea7\u54c1\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\uff08CNVD-2016-07415\uff09\u7684\u8865\u4e01", "products": { "product": [ "IBM Rational Collaborative Lifecycle Management 6.0.2", "IBM Rational Collaborative Lifecycle Management 6.0.1", "IBM Rational Team Concert 6.0.2", "IBM Rational Team Concert 6.0.1", "IBM Rational Engineering Lifecycle Manager 6.0.1", "IBM Rational Engineering Lifecycle Manager 6.0.2", "IBM Rational Rhapsody Design Manager 6.0.1", "IBM Rational Rhapsody Design Manager 6.0.2", "IBM Rational DOORS Next Generation 6.0.2", "IBM Rational DOORS Next Generation 6.0.1", "IBM Rational Quality Manager 6.0.2", "IBM Rational Quality Manager 6.0.1" ] }, "referenceLink": "http://www.securityfocus.com/bid/92869\r\nhttp://www-01.ibm.com/support/docview.wss?uid=swg21989940", "serverity": "\u4e2d", "submitTime": "2016-09-09", "title": "\u591a\u6b3eIBM\u4ea7\u54c1\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\uff08CNVD-2016-07415\uff09" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.