Learn about CVE-2021-29670 affecting IBM Engineering products, enabling cross-site scripting. Understand the impact, affected versions, and mitigation steps.
IBM Jazz Foundation and IBM Engineering products are vulnerable to cross-site scripting, potentially leading to credentials disclosure. The impact affects various IBM products including Engineering Test Management, Rational Rhapsody Model Manager, Rational Quality Manager, Rational DOORS Next Generation, among others.
Understanding CVE-2021-29670
This CVE highlights a cross-site scripting vulnerability in IBM Jazz Foundation and IBM Engineering products.
What is CVE-2021-29670?
The vulnerability allows users to inject arbitrary JavaScript code into the Web UI, potentially compromising the intended functionality and exposing sensitive credentials within trusted sessions. The affected products include Engineering Test Management, Rational Rhapsody Model Manager, Rational Quality Manager, Rational DOORS Next Generation, Engineering Lifecycle Optimization, Rational Collaborative Lifecycle Management, and Rational Engineering Lifecycle Manager.
The Impact of CVE-2021-29670
The impact of this vulnerability is considered medium with a CVSSv3 base score of 5.4. It requires user interaction for exploitation and could lead to credentials disclosure within a trusted session.
Technical Details of CVE-2021-29670
This section provides specific technical details related to the CVE.
Vulnerability Description
The vulnerability in IBM Jazz Foundation and IBM Engineering products allows for a cross-site scripting attack, enabling the injection of arbitrary JavaScript code into the Web UI.
Affected Systems and Versions
The affected systems include Engineering Test Management 7.0.0 and 7.0.1, Rational Rhapsody Model Manager 6.0.6, 6.0.6.1, and 7.0, Rational Quality Manager 6.0.6 and 6.0.6.1, Rational DOORS Next Generation 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2, and several other IBM products.
Exploitation Mechanism
The exploit code maturity is rated as high, with low privileges required for successful exploitation. The attack complexity is low, and user interaction is necessary for the exploit.
Mitigation and Prevention
Protecting your systems from CVE-2021-29670.
Immediate Steps to Take
Users are advised to apply official fixes provided by IBM to mitigate the risk associated with this vulnerability.
Long-Term Security Practices
Implement secure coding practices and regularly update systems to address vulnerabilities and enhance security.
Patching and Updates
Stay informed about security bulletins and patches released by IBM to address the CVE-2021-29670 vulnerability.