According to Secunia, input passed to the "BaseTarget" and "Src" parameters isn't properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
The vulnerabilities, which Secunia's rating system ranks as "less critical," have been reported in version 6.5.2. Other versions may also be affected.
The vulnerability was first reported by IBM on Tuesday. On its Web site, IBM offers a solution and declares the vulnerability to be fixed. The solution consists of applying APAR LO07849 and LO07850.