Lucene search

K
ibmIBM808FE61E558C9E6A782B9A6B76ED805F754B2DCF5DE1F7F68E89D89EF42C58B1
HistoryFeb 17, 2021 - 5:45 p.m.

Security Bulletin: IBM Maximo Data Loader (maxloader) shipped with IBM Maximo for Civil Infrastructure is vulnerable to cross-site scripting and missing or insecure "X-Content-Type-Options" header

2021-02-1717:45:44
www.ibm.com
5

0.001 Low

EPSS

Percentile

29.9%

Summary

There is missing or insecure “X-Content-Type-Options” header in Maximo Data Loader (maxloader) which is shipped with IBM Maximo for Civil Infrastructure. It may be possible to gather sensitive information about the web application such as usernames, passwords, machine name and/or sensitive file locations.

Vulnerability Details

CVEID:CVE-2021-20444
**DESCRIPTION:**IBM Maximo for Civil Infrastructure is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
CVSS Base score: 6.1
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/196620 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Maximo for Civil Infrastructure V7.6.2

Remediation/Fixes

The recommended solution is to apply the interim fix, Fix Pack or PTF containing the APAR for the named product as soon as practical.

Download the correct version of the fix from the following link: Maximo for Civil Infrastructure Fix Pack 7.6.2.1. Installation instructions for the fix are included in the readme document that is in the fix package.

Workarounds and Mitigations

None

CPENameOperatorVersion
ibm maximo civil infrastructureeq7.6.2

0.001 Low

EPSS

Percentile

29.9%

Related for 808FE61E558C9E6A782B9A6B76ED805F754B2DCF5DE1F7F68E89D89EF42C58B1