Security Bulletin
Summary
IBM API Connect has addressed the following vulnerability
Vulnerability Details
CVEID: CVE-2020-4838
DESCRIPTION: IBM API Connect is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
CVSS Base score: 6.4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/190036 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N)
Affected Products and Versions
Affected Product(s) | Version(s) |
API Connect | IBM API Connect V5.0.0.0-5.0.8.10 |
Remediation/Fixes
Affected Product |
Addressed in VRMF
|
APAR
|
Remediation / First Fix
|
IBM API Connect V5.0.0.0-5.0.8.10 |
5.0.8.10 iFix (Developer Portal) released on December 18th, 2020 or later. | LI81918 | Addressed in IBM API Connect V5.0.8.10 iFix (Developer Portal)
released on December 18, 2020 or later Developer Portal is impacted. Follow this link and find the "Portal" package: http://www.ibm.com/support/fixcentral/swg/quickorder |
Workarounds and Mitigations
None
Get Notified about Future Security Bulletins
References
Acknowledgement
This vulnerability was reported to IBM by Tomáš Melicher from Citadelo.
Change History
2021 January 11: Initial Publication
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Document Location
Worldwide
Was this topic helpful?
Document Information
Modified date:
13 January 2021
UID
ibm16402719