IBM Maximo Asset Management Multiple Vulnerabilities


Description   (#Several vulnerabilities were reported in IBM Maximo Asset Management:#- CVE-2016-0222: security bypass allowing an attacker to view logs during purchase orders (only affects version 7.6)##- CVE-2016-0262: cross-site scripting##No further information is available.)
     
Vulnerable Products   Vulnerable Software:
Maximo Asset Management (IBM) - 7.1, 7.1.1.0, 7.1.1.10, 7.1.1.11, 7.1.1.12, ..., 7.5.0.9, 7.6, 7.6.0.1, 7.6.0.2, 7.6.0.3
     
Solution   - 7.1.1: please contact IBM support in order to obtain the interim fix.
     
CVE   CVE-2016-0262
CVE-2016-0222
     
References   - IBM : IBM Maximo Asset Management could allow an authenticated user to view work logs during purchase orders that they should not have access to (CVE-2016-0222)
https://www-304.ibm.com/support/docview.wss?uid=swg21976949
- IBM : IBM Maximo Asset Management is vulnerable to cross-site scripting, caused by improper validation of user-supplied input (CVE-2016-0262)
https://www-304.ibm.com/support/docview.wss?uid=swg21977828
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
XSS - Prevention - GET : suspicious 'iframe' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'meta' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious tag with event found in URL
3.2.0
XSS - Prevention - GET : suspicious 'applet' tag found in URL
3.2.0
XSS - Phishing : suspicious 'div' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' attribute found in URL
3.2.0
XSS - Prevention - GET : suspicious 'img' tag found in URL
3.2.0
XSS - Phishing : suspicious 'a' tag found in URL
3.2.0
XSS - Prevention - GET : cookie access attempt using script language found in URL
3.2.0
XSS - Prevention - GET : suspicious 'embed' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'object' tag found in URL
3.2.0
XSS - Phishing : suspicious 'form' tag found in URL
3.2.0
XSS - Prevention - GET : javascript code found in URL
3.2.0
XSS - Prevention - GET : evasion attempt using tag characters encoding in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' tag found in URL
3.2.0
XSS - Phishing : suspicious 'link' tag found in URL
3.2.0
XSS - Prevention - GET : 'script' tag found in URL
3.2.0
XSS - Prevention - GET : 'location' javascript object found in URL
3.2.0
XSS - Prevention - GET : suspicious 'div' tag found in URL
3.2.0
     


 
 
 
 
 Risk level 
Moderate 

 Vulnerability First Public Report Date 
2016-03-01 

 Target Type 
Server 

 Possible exploit 
Remote