SB2024042504 - Multiple vulnerabilities in IBM eDiscovery Manager
Published: April 25, 2024 Updated: December 29, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Improper input validation (CVE-ID: CVE-2016-1181)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
The vulnerability exists due to improper input validation in ActionServlet.java when handling multithreaded access to an ActionForm instance. A remote non-authenticated attacker can exploit this vulnerability to execute arbitrary code.
2) Cross-site scripting (CVE-ID: CVE-2016-1182)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
3) Cross-site scripting (CVE-ID: CVE-2008-2025)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
4) Security restrictions bypass (CVE-ID: CVE-2015-0899)
The vulnerability allows a remote attacker to bypass security restrictions on the target system.The weakness exists due to an error in the MultiPageValidator implementation in Apache Struts. A remote attacker can supply a modified page parameter to bypass intended access restrictions.
Remediation
Install update from vendor's website.