Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
A vulnerability has been reported in IBM WebSphere Portal, which can be exploited by malicious people to conduct cross-site scripting attacks.
IMPACT: NORMAL
PUBLISH DATE: 26-09-2018
OVERVIEW
An update is available for IBM WebSphere Portal, some versions of which were found vulnerable to cross-site scripting attacks.
ANALYSIS
Some versions of the IBM WebSphere Portal were found to be vulnerable. When people with malicious intent exploit this issue, they may launch cross-site scripting attacks on the Portal.
The error allows users to embed arbitrary JavaScript code in the Web User Interface. Consequently, the intended functionality is changed, which may lead to disclosure of credentials within a trusted session. The vendor has now released updates for the affected versions.
AFFECTED PRODUCTS
IBM WebSphere Portal 8.x
(IBM WebSphere Portal 9.0.0.0 – 9.0.0.0 CF16, 8.5.0.0 – 8.5.0.0 CF16 and 8.0.0.0 – 8.0.0.1 CF23)
MITIGATION
There’s no mitigation or workaround for this vulnerability. However, updates are available that patch the vulnerability.
UPDATES
The vendor has released following updates for the affected products.
Follow this link for further help in installing updates.
https://www-01.ibm.com/support/docview.wss?uid=ibm10732287
If you think you are a victim of a cyberattack, immediately send an email to info@rewterz.com.