CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
EPSS
Percentile
55.1%
A potential cross site scripting (XSS) vulnerability was found using the IBM Tivoli Enterprise Portal browser client.
VULNERABILITY DETAILS:
_CVEID: _CVE-2013-0576 **DESCRIPTION: *Cross site scripting (XSS) vulnerability using Tivoli Enterprise Portal browser client.
.
CVSS:
CVSS Base Score: 4.3
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/83328> for the current score
CVSS Environmental Score: Undefined
CVSS Vector: (AV:N/AC:M/AU:N/C:N/I:P/A:N)
AFFECTED PRODUCTS AND VERSIONS:
IBM Tivoli Monitoring version 6.2.3 through 6.2.3 Fix Pack 02
IBM Tivoli Monitoring version 6.2.2 through 6.2.2 Fix Pack 09
IBM Tivoli Monitoring version 6.2.1 through 6.2.1 Fix Pack 04
IBM Tivoli Monitoring version 6.2.0 through 6.2.0 Fix Pack 03
REMEDIATION:
The recommended solution is to apply the fix for the version of IBM Tivoli Monitoring as listed below:
_Fix_* | VRMF | APAR | How to acquire fix |
---|---|---|---|
6.2.2-TIV-ITM-FP0009-IV32812 | 6.2.2 | IV32812 | http://www-01.ibm.com/support/docview.wss?uid=swg24034859 |
6.2.3-TIV-ITM-FP0003 | 6.2.3 | IV32812 | http://www-01.ibm.com/support/docview.wss?uid=swg24033803 |
ITM Version 6.30 | 6.3.0 | IV32812 | Available from Passport Advantage: |
6.3.0-TIV-ITM-FP0001 | 6.3.0.1 | IV32812 | http://www-01.ibm.com/support/docview.wss?uid=swg24034843 |
Note: Customers running on IBM Tivoli Monitoring version 6.2.0.x through 6.2.2.8 should either upgrade to 6.2.2 FP9 and install associated fix listed above to address the vulnerability, or upgrade to 6.2.3 FP3 or 6.3.0 (or later) which include the fixes for the vulnerabilities.
Workaround(s):
Use the Java Webstart client instead of the browser client.
Mitigation(s):
None.
REFERENCES:
ยท Complete CVSS Guide
ยท On-line Calculator V2_ _
ยท CVE-2013-0576
ยท _X-Force Vulnerability Database __<https://exchange.xforce.ibmcloud.com/vulnerabilities/83328>_
RELATED INFORMATION:
_IBM Secure Engineering Web Portal _
IBM Product Security Incident Response Blog
ACKNOWLEDGEMENT
None.
CHANGE HISTORY
17 May 2013 Original Copy Published
23 Aug 2013 Changed โor upgrade to 6.2.2 FP3โ to โor upgrade to 6.2.3 FP3โ
_*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash. _
_Note: _According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an โindustry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.โ IBM PROVIDES THE CVSS SCORES โAS ISโ WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
[{โProductโ:{โcodeโ:โSSTFXAโ,โlabelโ:โTivoli Monitoringโ},โBusiness Unitโ:{โcodeโ:โBU059โ,โlabelโ:โIBM Software w/o TPSโ},โComponentโ:โNot Applicableโ,โPlatformโ:[{โcodeโ:โPF002โ,โlabelโ:โAIXโ},{โcodeโ:โPF016โ,โlabelโ:โLinuxโ},{โcodeโ:โPF033โ,โlabelโ:โWindowsโ}],โVersionโ:โ6.2.0;6.2.1;6.2.2;6.2.3;6.3.0โ,โEditionโ:โโ,โLine of Businessโ:{โcodeโ:โLOB45โ,โlabelโ:โAutomationโ}}]
Vendor | Product | Version | CPE |
---|---|---|---|
ibm | tivoli_monitoring | 6.2.0 | cpe:2.3:a:ibm:tivoli_monitoring:6.2.0:*:*:*:*:*:*:* |
ibm | tivoli_monitoring | 6.2.1 | cpe:2.3:a:ibm:tivoli_monitoring:6.2.1:*:*:*:*:*:*:* |
ibm | tivoli_monitoring | 6.2.2 | cpe:2.3:a:ibm:tivoli_monitoring:6.2.2:*:*:*:*:*:*:* |
ibm | tivoli_monitoring | 6.2.3 | cpe:2.3:a:ibm:tivoli_monitoring:6.2.3:*:*:*:*:*:*:* |
ibm | tivoli_monitoring | 6.3.0 | cpe:2.3:a:ibm:tivoli_monitoring:6.3.0:*:*:*:*:*:*:* |