CVE编号
CVE-2017-1753利用情况
暂无补丁情况
N/A披露时间
2018-08-21漏洞描述
IBM Rational Collaborative Lifecycle Management等都是美国IBM公司的产品。IBM Rational Collaborative Lifecycle Management(CLM)是一套协作化生命周期管理解决方案。Rational Quality Manager(RQM)是一套协作的、基于Web的质量管理解决方案。多款IBM产品中存在跨站脚本漏洞。远程攻击者可利用该漏洞注入恶意的HTML代码并在用户的Web浏览器中执行这些代码。
解决建议
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:https://www-01.ibm.com/support/docview.wss?uid=ibm10713739
参考链接 |
|
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/135655 | |
https://www.ibm.com/support/docview.wss?uid=ibm10713739 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | ibm | rational_doors_next_generation | * |
From (including) 5.0.0 |
Up to (including) 5.0.2 |
||||
运行在以下环境 | |||||||||
应用 | ibm | rational_doors_next_generation | * |
From (including) 6.0.0 |
Up to (including) 6.0.5 |
||||
运行在以下环境 | |||||||||
应用 | ibm | rational_engineering_lifecycle_manager | * |
From (including) 5.0.0 |
Up to (including) 5.0.2 |
||||
运行在以下环境 | |||||||||
应用 | ibm | rational_engineering_lifecycle_manager | * |
From (including) 6.0.0 |
Up to (including) 6.0.5 |
||||
运行在以下环境 | |||||||||
应用 | ibm | rational_quality_manager | * |
From (including) 5.0.0 |
Up to (including) 5.0.2 |
||||
运行在以下环境 | |||||||||
应用 | ibm | rational_quality_manager | * |
From (including) 6.0.0 |
Up to (including) 6.0.5 |
||||
运行在以下环境 | |||||||||
应用 | ibm | rational_rhapsody_design_manager | * |
From (including) 5.0.0 |
Up to (including) 5.0.2 |
||||
运行在以下环境 | |||||||||
应用 | ibm | rational_rhapsody_design_manager | * |
From (including) 6.0.0 |
Up to (including) 6.0.5 |
||||
运行在以下环境 | |||||||||
应用 | ibm | rational_software_architect_design_manager | * |
From (including) 5.0.0 |
Up to (including) 5.0.2 |
||||
运行在以下环境 | |||||||||
应用 | ibm | rational_software_architect_design_manager | * |
From (including) 6.0.0 |
Up to (including) 6.0.1 |
||||
运行在以下环境 | |||||||||
应用 | ibm | rational_team_concert | * |
From (including) 5.0.0 |
Up to (including) 5.0.2 |
||||
运行在以下环境 | |||||||||
系统 | debian_10 | kiwi | * |
Up to (excluding) 0~git20190207-1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_11 | kiwi | * |
Up to (excluding) 0~git20200925-1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_9 | kiwi | * |
Up to (excluding) 0~git20160726-3 |
|||||
运行在以下环境 | |||||||||
系统 | debian_sid | kiwi | * |
Up to (excluding) 0~git20200925-1 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_27 | kiwi | * |
Up to (excluding) 6.5.7-4.fc27 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_EPEL_7 | kiwi | * |
Up to (excluding) 6.5.6-3.el7 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_42.2 | kiwi | * |
Up to (excluding) 6.5.1-6.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_42.3 | kiwi | * |
Up to (excluding) 6.5.1-6.1 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04_lts | global | * |
Up to (excluding) 6.6.2-1 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.10 | global | * |
Up to (excluding) 6.6.2-1 |
|||||
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 低
- 影响范围 已更改
- 用户交互 需要
- 可用性 无
- 保密性 低
- 完整性 低
还没有评论,来说两句吧...