PatchSiren

PatchSiren cyber security CVE debrief

CVE-2017-1127 IBM CVE debrief

CVE-2017-1127 is a cross-site scripting vulnerability in IBM Rational DOORS Next Generation 4.0, 5.0, and 6.0, with NVD CPE data also listing IBM Rational Requirements Composer 4.0 variants. The issue can let a user embed arbitrary JavaScript in the web UI, which may alter application behavior and expose credentials or other sensitive data within a trusted session. The NVD vector reflects a network-reachable issue that requires low privileges and user interaction, with impact to confidentiality and integrity but not availability.

Vendor
IBM
Product
CVE-2017-1127
CVSS
MEDIUM 5.4
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-08
Original CVE updated
2026-05-13
Advisory published
2017-02-08
Advisory updated
2026-05-13

Who should care

Administrators, security teams, and users of IBM Rational DOORS Next Generation and IBM Rational Requirements Composer should care most, especially in environments where the web UI is used for sensitive requirements or engineering data. Any deployment that allows authenticated users to create or modify content in the affected UI should treat this as a session-integrity and credential-theft risk.

Technical summary

NVD classifies the weakness as CWE-79 (cross-site scripting). The supplied CVSS 3.0 vector is AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N, indicating a remotely reachable issue that needs a low-privileged actor and user interaction. In practical terms, the vulnerable web UI can be used to inject JavaScript into pages rendered for other users, which can change intended application behavior and may expose data available in the victim’s authenticated browser session.

Defensive priority

Medium. The score is 5.4, but the trusted-session context makes this worth prioritizing in any environment with sensitive IBM Rational data or broad internal access. Remediation should be expedited if the product is still in active use or exposed to a large user population.

Recommended defensive actions

  • Review the IBM PSIRT advisory referenced by NVD and apply the vendor-recommended fix or update path for the affected product versions.
  • Inventory all deployments of IBM Rational DOORS Next Generation and IBM Rational Requirements Composer, including older 4.0/5.0/6.0 instances and any cloned or test environments.
  • Treat authenticated content creation or editing paths as high-risk until patched; restrict who can author or modify web content where feasible.
  • Validate that session protections are in place, including secure cookie settings, least-privilege access, and monitoring for unusual browser-side behavior.
  • Check for any signs of unexpected script injection or anomalous user activity in application logs and related web access logs.

Evidence notes

This debrief is based only on the supplied NVD record, the CVE description, and the vendor references embedded in that record. NVD lists the vulnerability as modified on 2026-05-13 and published on 2017-02-08. The record identifies CWE-79 and provides a CVSS 3.0 vector of AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N. The supplied references include an IBM PSIRT advisory link and a SecurityFocus entry; no KEV entry was provided in the enrichment.

Official resources

Publicly disclosed in the NVD/CVE record on 2017-02-08; vendor guidance is referenced in the IBM PSIRT advisory linked from NVD.