CVE-2018-11059

RSA Archer, versions prior to 6.4.0.1, contain a stored cross-site scripting vulnerability. A remote authenticated malicious Archer user could potentially exploit this vulnerability to store malicious HTML or JavaScript code in a trusted application data store. When application users access the corrupted data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable web application.
References
Link Resource
http://seclists.org/fulldisclosure/2018/Jul/69 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/104892 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1041359 Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2018/Jul/69 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/104892 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1041359 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rsa:archer:*:*:*:*:*:*:*:*
cpe:2.3:a:rsa:archer:*:*:*:*:*:*:*:*
cpe:2.3:a:rsa:archer:*:*:*:*:*:*:*:*
cpe:2.3:a:rsa:archer:6.4.0.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:42

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2018/Jul/69 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2018/Jul/69 - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/bid/104892 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/104892 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1041359 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1041359 - Third Party Advisory, VDB Entry
CVSS v2 : 3.5
v3 : 5.4
v2 : 3.5
v3 : 8.2

Information

Published : 2018-07-24 19:29

Updated : 2024-11-21 03:42


NVD link : CVE-2018-11059

Mitre link : CVE-2018-11059

CVE.ORG link : CVE-2018-11059


JSON object : View

Products Affected

rsa

  • archer
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')