FKIE_CVE-2024-43184
Vulnerability from fkie_nvd - Published: 2025-09-04 15:15 - Updated: 2025-12-02 21:33
Severity ?
Summary
IBM Jazz Foundation 7.0.2 through 7.0.2 iFix033, 7.0.3 through 7.0.3 iFix012, and 7.1.0 through 7.1.0 iFix002 is vulnerable to cross-site scripting. This vulnerability allows an unauthenticated attacker to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
References
| URL | Tags | ||
|---|---|---|---|
| psirt@us.ibm.com | https://www.ibm.com/support/pages/node/7244013 | Patch, Vendor Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.2:-:*:*:*:*:*:*",
"matchCriteriaId": "441ECFF5-7336-4638-8E9A-FDCB25B64455",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.2:ifix001:*:*:*:*:*:*",
"matchCriteriaId": "5732ED04-5F96-4599-93E6-7584885D2B93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.2:ifix002:*:*:*:*:*:*",
"matchCriteriaId": "95526B74-096B-4B77-9335-753403C8FD4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.2:ifix003:*:*:*:*:*:*",
"matchCriteriaId": "261024C4-6F61-412E-8AD1-735E691BF47C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.2:ifix004:*:*:*:*:*:*",
"matchCriteriaId": "D9F6D0FB-E128-478F-B8AA-D19E9C4B48C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.2:ifix005:*:*:*:*:*:*",
"matchCriteriaId": "5369A9EE-5DA1-4FDC-8D61-7B34AC7CA2E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.2:ifix006:*:*:*:*:*:*",
"matchCriteriaId": "8A8996A8-891F-45F3-8950-4D3CDC31FBF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.2:ifix007:*:*:*:*:*:*",
"matchCriteriaId": "5C3158CF-3B4D-424E-9D71-32949A46ADD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.2:ifix008a:*:*:*:*:*:*",
"matchCriteriaId": "FC5C310D-EF92-4B9F-BAB7-1E768336AAF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.2:ifix009:*:*:*:*:*:*",
"matchCriteriaId": "08DAB6ED-24E3-4041-8230-1D2C15904FD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.2:ifix010:*:*:*:*:*:*",
"matchCriteriaId": "782AB41B-3C55-4701-8F6B-2CDA70A9D66B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.2:ifix011:*:*:*:*:*:*",
"matchCriteriaId": "D5CAE940-F815-472B-AFA7-9E25D04BC519",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.2:ifix012:*:*:*:*:*:*",
"matchCriteriaId": "E853B8B5-735D-4873-9377-CFBBC61C6196",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.2:ifix013:*:*:*:*:*:*",
"matchCriteriaId": "2690EEF9-0D5F-4C30-823E-9ABE703007E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.2:ifix014:*:*:*:*:*:*",
"matchCriteriaId": "193C0380-AD9F-4823-81D8-AB2B95E0C200",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.2:ifix016:*:*:*:*:*:*",
"matchCriteriaId": "B5ABD29B-3AF6-4760-A3CA-356CD933370A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.2:ifix017:*:*:*:*:*:*",
"matchCriteriaId": "D0A30F1F-59AA-485F-853B-B8DF430C2787",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.2:ifix018:*:*:*:*:*:*",
"matchCriteriaId": "DFEAFE85-375D-47DD-8D29-BB8AC17EC557",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.2:ifix020a:*:*:*:*:*:*",
"matchCriteriaId": "899CFB7F-21AD-47AF-8494-3D3E0E243130",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.2:ifix021:*:*:*:*:*:*",
"matchCriteriaId": "563E2A40-CB7C-456C-9915-2F5D01FF37AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.2:ifix022:*:*:*:*:*:*",
"matchCriteriaId": "91379E62-5D52-4E70-BB55-5CD44D441808",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.2:ifix023:*:*:*:*:*:*",
"matchCriteriaId": "2E60A806-F8F5-464C-95CD-75F5D7EB9065",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.2:ifix024:*:*:*:*:*:*",
"matchCriteriaId": "6FF16BF8-714D-4FB0-88BA-CF0D6B5B355E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.2:ifix025:*:*:*:*:*:*",
"matchCriteriaId": "5EBC2E3B-028B-4822-B5C9-B876C99E82C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.2:ifix026a:*:*:*:*:*:*",
"matchCriteriaId": "869E2253-1EF8-482E-A1DF-09194B45990B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.2:ifix027:*:*:*:*:*:*",
"matchCriteriaId": "41059E5C-FE0B-46FA-9F67-6223F72CA5EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.2:ifix028:*:*:*:*:*:*",
"matchCriteriaId": "453C5894-0B5B-4AB1-BDDC-005201B94165",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.2:ifix029:*:*:*:*:*:*",
"matchCriteriaId": "5D296DAF-F407-44C7-910B-53BA9E7E0FCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.2:ifix030:*:*:*:*:*:*",
"matchCriteriaId": "2A4AF381-C5A8-44CA-BD5F-B7167BCBEE0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.2:ifix031:*:*:*:*:*:*",
"matchCriteriaId": "6BB65C18-7859-4CBC-BA99-FE50971031FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.2:ifix032:*:*:*:*:*:*",
"matchCriteriaId": "2C3A76AB-C70B-49F7-B73C-1A73F2497A08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.2:ifix033:*:*:*:*:*:*",
"matchCriteriaId": "B707842F-4CED-4D84-B812-75B2DB818C0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.3:-:*:*:*:*:*:*",
"matchCriteriaId": "E7BEB914-06D8-4F0B-89C8-DFFF89B432F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.3:ifix001:*:*:*:*:*:*",
"matchCriteriaId": "FF01D2AF-8FCB-49FB-BD5F-17877F7731F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.3:ifix002:*:*:*:*:*:*",
"matchCriteriaId": "B766EDB8-4115-4682-B1AD-57C99107A195",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.3:ifix003:*:*:*:*:*:*",
"matchCriteriaId": "9AB07BE6-C24B-4D7A-B906-2268BAF742CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.3:ifix004:*:*:*:*:*:*",
"matchCriteriaId": "C405EE5A-4320-4960-B430-00AFCF540089",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.3:ifix005:*:*:*:*:*:*",
"matchCriteriaId": "CE6616C0-F434-4189-AF6E-07AB0E04626F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.3:ifix006:*:*:*:*:*:*",
"matchCriteriaId": "854B0828-F782-4F8E-9970-AA7BF2A4F0F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.3:ifix007:*:*:*:*:*:*",
"matchCriteriaId": "76F5529B-09C3-4B3D-B670-978EDE39F086",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.3:ifix008:*:*:*:*:*:*",
"matchCriteriaId": "E2FD2D5C-2BF9-4558-B794-A2CEC3E13E3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.3:ifix009:*:*:*:*:*:*",
"matchCriteriaId": "71F966A3-4D5A-4870-91A0-F7BE6AEECDFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.3:ifix010:*:*:*:*:*:*",
"matchCriteriaId": "32BB09AF-ED78-4FFB-8313-AC527250CE6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.3:ifix011:*:*:*:*:*:*",
"matchCriteriaId": "01E9BCE0-684F-4624-BD4C-2A90E160C63D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.0.3:ifix012:*:*:*:*:*:*",
"matchCriteriaId": "62031B5D-C2BE-433B-89D4-9CEB013E0402",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.1.0:-:*:*:*:*:*:*",
"matchCriteriaId": "53EA48FB-EA3A-4111-AAAF-F7053DBEEEA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.1.0:ifix001:*:*:*:*:*:*",
"matchCriteriaId": "5BD93D68-30C9-4E29-8295-AC0121F2EFF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:jazz_foundation:7.1.0:ifix002:*:*:*:*:*:*",
"matchCriteriaId": "979A3BCA-1EDD-4020-918B-BBEBB6F7EFF0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Jazz Foundation 7.0.2 through 7.0.2 iFix033, 7.0.3 through 7.0.3 iFix012, and 7.1.0 through 7.1.0 iFix002 is vulnerable to cross-site scripting. This vulnerability allows an unauthenticated attacker to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session."
}
],
"id": "CVE-2024-43184",
"lastModified": "2025-12-02T21:33:55.763",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "psirt@us.ibm.com",
"type": "Primary"
}
]
},
"published": "2025-09-04T15:15:45.200",
"references": [
{
"source": "psirt@us.ibm.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.ibm.com/support/pages/node/7244013"
}
],
"sourceIdentifier": "psirt@us.ibm.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "psirt@us.ibm.com",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…