CNVD-2022-54645

Vulnerability from cnvd - Published: 2022-08-02
VLAI Severity ?
Title
IBM Robotic Process Automation跨站脚本漏洞
Description
IBM Robotic Process Automation是美国IBM公司的一种机器人流程自动化产品。可帮助您以传统 RPA 的轻松和速度大规模自动化更多业务和 IT 流程。 IBM Robotic Process Automation 21.0.1和 21.0.2版本存在跨站脚本漏洞,攻击者可利用该漏洞在Web UI中嵌入任意JavaScript代码,从而改变预期的功能可能导致受信任会话中的凭据泄露。
Severity
Patch Name
IBM Robotic Process Automation跨站脚本漏洞的补丁
Patch Description
IBM Robotic Process Automation是美国IBM公司的一种机器人流程自动化产品。可帮助您以传统 RPA 的轻松和速度大规模自动化更多业务和 IT 流程。 IBM Robotic Process Automation 21.0.1和 21.0.2版本存在跨站脚本漏洞,攻击者可利用该漏洞在Web UI中嵌入任意JavaScript代码,从而改变预期的功能可能导致受信任会话中的凭据泄露。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

厂商已发布了漏洞修复程序,请及时关注更新: https://www.ibm.com/support/pages/node/6597667

Reference
https://exchange.xforce.ibmcloud.com/vulnerabilities/227124
Impacted products
Name
['IBM Robotic Process Automation 21.0.1', 'IBM Robotic Process Automation 21.0.2']
Show details on source website

{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2022-22502",
      "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2022-22502"
    }
  },
  "description": "IBM Robotic Process Automation\u662f\u7f8e\u56fdIBM\u516c\u53f8\u7684\u4e00\u79cd\u673a\u5668\u4eba\u6d41\u7a0b\u81ea\u52a8\u5316\u4ea7\u54c1\u3002\u53ef\u5e2e\u52a9\u60a8\u4ee5\u4f20\u7edf RPA \u7684\u8f7b\u677e\u548c\u901f\u5ea6\u5927\u89c4\u6a21\u81ea\u52a8\u5316\u66f4\u591a\u4e1a\u52a1\u548c IT \u6d41\u7a0b\u3002\n\nIBM Robotic Process Automation 21.0.1\u548c 21.0.2\u7248\u672c\u5b58\u5728\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5728Web UI\u4e2d\u5d4c\u5165\u4efb\u610fJavaScript\u4ee3\u7801\uff0c\u4ece\u800c\u6539\u53d8\u9884\u671f\u7684\u529f\u80fd\u53ef\u80fd\u5bfc\u81f4\u53d7\u4fe1\u4efb\u4f1a\u8bdd\u4e2d\u7684\u51ed\u636e\u6cc4\u9732\u3002",
  "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://www.ibm.com/support/pages/node/6597667",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2022-54645",
  "openTime": "2022-08-02",
  "patchDescription": "IBM Robotic Process Automation\u662f\u7f8e\u56fdIBM\u516c\u53f8\u7684\u4e00\u79cd\u673a\u5668\u4eba\u6d41\u7a0b\u81ea\u52a8\u5316\u4ea7\u54c1\u3002\u53ef\u5e2e\u52a9\u60a8\u4ee5\u4f20\u7edf RPA \u7684\u8f7b\u677e\u548c\u901f\u5ea6\u5927\u89c4\u6a21\u81ea\u52a8\u5316\u66f4\u591a\u4e1a\u52a1\u548c IT \u6d41\u7a0b\u3002\r\n\r\nIBM Robotic Process Automation 21.0.1\u548c 21.0.2\u7248\u672c\u5b58\u5728\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5728Web UI\u4e2d\u5d4c\u5165\u4efb\u610fJavaScript\u4ee3\u7801\uff0c\u4ece\u800c\u6539\u53d8\u9884\u671f\u7684\u529f\u80fd\u53ef\u80fd\u5bfc\u81f4\u53d7\u4fe1\u4efb\u4f1a\u8bdd\u4e2d\u7684\u51ed\u636e\u6cc4\u9732\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "IBM Robotic Process Automation\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "IBM Robotic Process Automation 21.0.1",
      "IBM Robotic Process Automation 21.0.2"
    ]
  },
  "referenceLink": "https://exchange.xforce.ibmcloud.com/vulnerabilities/227124",
  "serverity": "\u4f4e",
  "submitTime": "2022-06-28",
  "title": "IBM Robotic Process Automation\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…