CVE-2023-42015

IBM UrbanCode Deploy (UCD) 7.1 through 7.1.2.14, 7.2 through 7.2.3.7, and 7.3 through 7.3.2.2 is vulnerable to HTML injection. This vulnerability may allow a user to embed arbitrary HTML tags in the Web UI potentially leading to sensitive information disclosure. IBM X-Force ID: 265512.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ibm:urbancode_deploy:*:*:*:*:*:*:*:*
cpe:2.3:a:ibm:urbancode_deploy:*:*:*:*:*:*:*:*
cpe:2.3:a:ibm:urbancode_deploy:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:22

Type Values Removed Values Added
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/265512 - VDB Entry, Vendor Advisory () https://exchange.xforce.ibmcloud.com/vulnerabilities/265512 - VDB Entry, Vendor Advisory
References () https://www.ibm.com/support/pages/node/7096546 - Vendor Advisory () https://www.ibm.com/support/pages/node/7096546 - Vendor Advisory

27 Dec 2023, 18:52

Type Values Removed Values Added
CWE CWE-79
Summary
  • (es) IBM UrbanCode Deploy (UCD) 7.1 a 7.1.2.14, 7.2 a 7.2.3.7 y 7.3 a 7.3.2.2 es vulnerable a la inyección de HTML. Esta vulnerabilidad puede permitir que un usuario incruste etiquetas HTML arbitrarias en la interfaz de usuario web, lo que podría provocar la divulgación de información confidencial. ID de IBM X-Force: 265512.
CPE cpe:2.3:a:ibm:urbancode_deploy:*:*:*:*:*:*:*:*
First Time Ibm urbancode Deploy
Ibm
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/265512 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/265512 - VDB Entry, Vendor Advisory
References () https://www.ibm.com/support/pages/node/7096546 - () https://www.ibm.com/support/pages/node/7096546 - Vendor Advisory

19 Dec 2023, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-19 03:15

Updated : 2024-11-21 08:22


NVD link : CVE-2023-42015

Mitre link : CVE-2023-42015

CVE.ORG link : CVE-2023-42015


JSON object : View

Products Affected

ibm

  • urbancode_deploy
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')