APAR status
Closed as program error.
Error description
A Cross-Site Scripting (XSS) vulnerability in InfoSphere IGC can be used by an attacker to inject arbitrary client-side script
Local fix
NA
Problem summary
********************************************* APAR Users Affected: ********************************************* Users of InfoSphere Information Governance Catalog that use the import functionality. ********************************************* APAR Problem Description: ********************************************* A non-persistent Cross-Site Scripting (XSS) vulnerability in InfoSphere IGC can be used by an attacker to execute malicious client-side script by manipulated victim. ********************************************* APAR Recommendation: ********************************************* Apply the fix for JR60176 *********************************************
Problem conclusion
Apply the fix for JR60176
Temporary fix
Comments
APAR Information
APAR number
JR60176
Reported component name
IS GOVCATLOG
Reported component ID
5724Q36GC
Reported release
B70
Status
CLOSED PER
PE
NoPE
HIPER
NoHIPER
Special Attention
NoSpecatt / Xsystem
Submitted date
2018-10-19
Closed date
2018-12-05
Last modified date
2018-12-05
APAR is sysrouted FROM one or more of the following:
APAR is sysrouted TO one or more of the following:
Fix information
Fixed component name
IS GOVCATLOG
Fixed component ID
5724Q36GC
Applicable component levels
RB31 PSY
UP
RB50 PSY
UP
RB70 PSY
UP
[{"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SSZJPZ","label":"IBM InfoSphere Information Server"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Line of Business":{"code":"LOB10","label":"Data and AI"}}]
Document Information
Modified date:
02 June 2020