Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-34165 (GCVE-0-2022-34165)
Vulnerability from cvelistv5
- Gain Access
URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
IBM | WebSphere Application Server |
Version: 7.0 Version: 8.0 Version: 8.5 Version: 9.0 |
|||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T08:16:17.214Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ibm.com/support/pages/node/6618747" }, { "name": "ibm-websphere-cve202234165-http-injection (229429)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/229429" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WebSphere Application Server", "vendor": "IBM", "versions": [ { "status": "affected", "version": "7.0" }, { "status": "affected", "version": "8.0" }, { "status": "affected", "version": "8.5" }, { "status": "affected", "version": "9.0" } ] }, { "product": "WebSphere Application Server Liberty", "vendor": "IBM", "versions": [ { "status": "affected", "version": "17.0.0.3" }, { "status": "affected", "version": "22.0.0.9" } ] } ], "datePublic": "2022-09-07T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 and IBM WebSphere Application Server Liberty 17.0.0.3 through 22.0.0.9 are vulnerable to HTTP header injection, caused by improper validation. This could allow an attacker to conduct various attacks against the vulnerable system, including cache poisoning and cross-site scripting. IBM X-Force ID: 229429." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitCodeMaturity": "UNPROVEN", "integrityImpact": "LOW", "privilegesRequired": "LOW", "remediationLevel": "OFFICIAL_FIX", "reportConfidence": "CONFIRMED", "scope": "UNCHANGED", "temporalScore": 4.7, "temporalSeverity": "MEDIUM", "userInteraction": "NONE", "vectorString": "CVSS:3.0/UI:N/PR:L/I:L/A:N/C:L/AV:N/AC:L/S:U/E:U/RC:C/RL:O", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Gain Access", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-09T16:00:15", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ibm.com/support/pages/node/6618747" }, { "name": "ibm-websphere-cve202234165-http-injection (229429)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/229429" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2022-09-07T00:00:00", "ID": "CVE-2022-34165", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WebSphere Application Server", "version": { "version_data": [ { "version_value": "7.0" }, { "version_value": "8.0" }, { "version_value": "8.5" }, { "version_value": "9.0" } ] } }, { "product_name": "WebSphere Application Server Liberty", "version": { "version_data": [ { "version_value": "17.0.0.3" }, { "version_value": "22.0.0.9" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 and IBM WebSphere Application Server Liberty 17.0.0.3 through 22.0.0.9 are vulnerable to HTTP header injection, caused by improper validation. This could allow an attacker to conduct various attacks against the vulnerable system, including cache poisoning and cross-site scripting. IBM X-Force ID: 229429." } ] }, "impact": { "cvssv3": { "BM": { "A": "N", "AC": "L", "AV": "N", "C": "L", "I": "L", "PR": "L", "S": "U", "UI": "N" }, "TM": { "E": "U", "RC": "C", "RL": "O" } } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Gain Access" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ibm.com/support/pages/node/6618747", "refsource": "CONFIRM", "title": "IBM Security Bulletin 6618747 (WebSphere Application Server Liberty)", "url": "https://www.ibm.com/support/pages/node/6618747" }, { "name": "ibm-websphere-cve202234165-http-injection (229429)", "refsource": "XF", "title": "X-Force Vulnerability Report", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/229429" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2022-34165", "datePublished": "2022-09-09T16:00:15.228171Z", "dateReserved": "2022-06-20T00:00:00", "dateUpdated": "2024-09-17T00:32:21.129Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-34165\",\"sourceIdentifier\":\"psirt@us.ibm.com\",\"published\":\"2022-09-09T16:15:08.933\",\"lastModified\":\"2024-11-21T07:08:59.023\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 and IBM WebSphere Application Server Liberty 17.0.0.3 through 22.0.0.9 are vulnerable to HTTP header injection, caused by improper validation. This could allow an attacker to conduct various attacks against the vulnerable system, including cache poisoning and cross-site scripting. IBM X-Force ID: 229429.\"},{\"lang\":\"es\",\"value\":\"IBM WebSphere Application Server versiones 7.0, 8.0, 8.5 y 9.0 e IBM WebSphere Application Server Liberty versiones 17.0.0.3 a 22.0.0.9 son vulnerables a una inyecci\u00f3n de encabezados HTTP, causada por una comprobaci\u00f3n inapropiada. Esto podr\u00eda permitir a un atacante conducir varios ataques contra el sistema vulnerable, incluyendo el envenenamiento de la cach\u00e9 y ataques de tipo cross-site scripting. ID de IBM X-Force ID: 229429\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N\",\"baseScore\":5.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.5}],\"cvssMetricV30\":[{\"source\":\"psirt@us.ibm.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N\",\"baseScore\":5.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.5}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-74\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.0.0.0\",\"versionEndIncluding\":\"7.0.0.45\",\"matchCriteriaId\":\"9FBC4C46-A044-4A5C-80EF-2BCBF9351CEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.0.0.0\",\"versionEndIncluding\":\"8.0.0.15\",\"matchCriteriaId\":\"E596AE8A-34AD-43F3-A97E-DC79CE517C8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.5.0.0\",\"versionEndIncluding\":\"8.5.5.22\",\"matchCriteriaId\":\"27F39A37-71C5-4498-9505-4730DA63978F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.0.0.0\",\"versionEndIncluding\":\"9.0.5.13\",\"matchCriteriaId\":\"7D22980A-8DA4-4E08-9140-23E24B141939\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:liberty:*:*:*\",\"versionStartIncluding\":\"17.0.0.3\",\"versionEndExcluding\":\"22.0.0.9\",\"matchCriteriaId\":\"915EF429-C292-4100-B22B-D7F84E644592\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"387021A0-AF36-463C-A605-32EA7DAC172E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F480AA32-841A-4E68-9343-B2E7548B0A0C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E492C463-D76E-49B7-A4D4-3B499E422D89\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C684FC45-C9BA-4EF0-BD06-BB289450DD21\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:ibm:z\\\\/os:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E97A964-6F9E-4C87-9B90-21AE2C1DF52F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"703AF700-7A70-47E2-BC3A-7FD03B3CA9C1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:-:*\",\"matchCriteriaId\":\"F5027746-8216-452D-83C5-2F8E9546F2A5\"}]}]}],\"references\":[{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/229429\",\"source\":\"psirt@us.ibm.com\",\"tags\":[\"VDB Entry\",\"Vendor Advisory\"]},{\"url\":\"https://www.ibm.com/support/pages/node/6618747\",\"source\":\"psirt@us.ibm.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/229429\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"VDB Entry\",\"Vendor Advisory\"]},{\"url\":\"https://www.ibm.com/support/pages/node/6618747\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}" } }
CERTFR-2024-AVI-0180
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
IBM | Cognos Analytics | Cognos Analytics versions 11.2.x antérieures à 11.2.4 Fix Pack 3 | ||
IBM | Cognos Analytics | Cognos Analytics versions 11.1.x antérieures à 11.1.7 Fix Pack 8 | ||
IBM | AIX | AIX versions 7.2 et 7.3 sans le dernier correctif de sécurité OpenSSH | ||
IBM | Cognos Analytics | Cognos Analytics versions 12.0.x antérieures à 12.0.2 | ||
IBM | WebSphere | Websphere Liberty versions antérieures à 23.0.0.12 | ||
IBM | VIOS | VIOS versions 3.1 et 4.1 sans le dernier correctif de sécurité OpenSSH | ||
IBM | Cloud Pak | Cognos Dashboards on Cloud Pak for Data versions antérieures à 4.8.3 | ||
IBM | N/A | Cognos Command Center versions antérieures à 10.2.5 IF1 | ||
IBM | Cognos Transformer | Cognos Transformer versions antérieures à 11.1.7 Fix Pack 8 |
Title | Publication Time | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.4 Fix Pack 3", "product": { "name": "Cognos Analytics", "vendor": { "name": "IBM", "scada": false } } }, { "description": "Cognos Analytics versions 11.1.x ant\u00e9rieures \u00e0 11.1.7 Fix Pack 8", "product": { "name": "Cognos Analytics", "vendor": { "name": "IBM", "scada": false } } }, { "description": "AIX versions 7.2 et 7.3 sans le dernier correctif de s\u00e9curit\u00e9 OpenSSH", "product": { "name": "AIX", "vendor": { "name": "IBM", "scada": false } } }, { "description": "Cognos Analytics versions 12.0.x ant\u00e9rieures \u00e0 12.0.2", "product": { "name": "Cognos Analytics", "vendor": { "name": "IBM", "scada": false } } }, { "description": "Websphere Liberty versions ant\u00e9rieures \u00e0 23.0.0.12", "product": { "name": "WebSphere", "vendor": { "name": "IBM", "scada": false } } }, { "description": "VIOS versions 3.1 et 4.1 sans le dernier correctif de s\u00e9curit\u00e9 OpenSSH", "product": { "name": "VIOS", "vendor": { "name": "IBM", "scada": false } } }, { "description": "Cognos Dashboards on Cloud Pak for Data versions ant\u00e9rieures \u00e0 4.8.3", "product": { "name": "Cloud Pak", "vendor": { "name": "IBM", "scada": false } } }, { "description": "Cognos Command Center versions ant\u00e9rieures \u00e0 10.2.5 IF1", "product": { "name": "N/A", "vendor": { "name": "IBM", "scada": false } } }, { "description": "Cognos Transformer versions ant\u00e9rieures \u00e0 11.1.7 Fix Pack 8", "product": { "name": "Cognos Transformer", "vendor": { "name": "IBM", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2023-0216", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0216" }, { "name": "CVE-2021-44906", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44906" }, { "name": "CVE-2023-21938", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21938" }, { "name": "CVE-2023-0401", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0401" }, { "name": "CVE-2023-21843", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21843" }, { "name": "CVE-2022-21426", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21426" }, { "name": "CVE-2021-35586", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35586" }, { "name": "CVE-2023-1370", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1370" }, { "name": "CVE-2023-45857", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45857" }, { "name": "CVE-2021-35550", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35550" }, { "name": "CVE-2023-51385", "url": "https://www.cve.org/CVERecord?id=CVE-2023-51385" }, { "name": "CVE-2023-46234", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46234" }, { "name": "CVE-2023-38359", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38359" }, { "name": "CVE-2021-3572", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3572" }, { "name": "CVE-2023-21954", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21954" }, { "name": "CVE-2022-4304", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4304" }, { "name": "CVE-2023-21939", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21939" }, { "name": "CVE-2023-21830", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21830" }, { "name": "CVE-2023-3817", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3817" }, { "name": "CVE-2023-0215", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0215" }, { "name": "CVE-2023-0286", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0286" }, { "name": "CVE-2022-21299", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21299" }, { "name": "CVE-2023-50324", "url": "https://www.cve.org/CVERecord?id=CVE-2023-50324" }, { "name": "CVE-2023-44487", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44487" }, { "name": "CVE-2023-45133", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45133" }, { "name": "CVE-2020-28458", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28458" }, { "name": "CVE-2023-26115", "url": "https://www.cve.org/CVERecord?id=CVE-2023-26115" }, { "name": "CVE-2022-40897", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40897" }, { "name": "CVE-2023-0466", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0466" }, { "name": "CVE-2023-0465", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0465" }, { "name": "CVE-2023-22081", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22081" }, { "name": "CVE-2022-4203", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4203" }, { "name": "CVE-2020-1971", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1971" }, { "name": "CVE-2021-4160", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4160" }, { "name": "CVE-2021-35559", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35559" }, { "name": "CVE-2023-0217", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0217" }, { "name": "CVE-2021-43138", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43138" }, { "name": "CVE-2023-48795", "url": "https://www.cve.org/CVERecord?id=CVE-2023-48795" }, { "name": "CVE-2021-35565", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35565" }, { "name": "CVE-2023-30589", "url": "https://www.cve.org/CVERecord?id=CVE-2023-30589" }, { "name": "CVE-2021-23445", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23445" }, { "name": "CVE-2021-35603", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35603" }, { "name": "CVE-2022-46364", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46364" }, { "name": "CVE-2021-3711", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3711" }, { "name": "CVE-2023-0464", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0464" }, { "name": "CVE-2021-3449", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3449" }, { "name": "CVE-2022-40609", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40609" }, { "name": "CVE-2023-32344", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32344" }, { "name": "CVE-2023-43051", "url": "https://www.cve.org/CVERecord?id=CVE-2023-43051" }, { "name": "CVE-2023-36478", "url": "https://www.cve.org/CVERecord?id=CVE-2023-36478" }, { "name": "CVE-2019-1547", "url": "https://www.cve.org/CVERecord?id=CVE-2019-1547" }, { "name": "CVE-2023-39410", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39410" }, { "name": "CVE-2021-35588", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35588" }, { "name": "CVE-2021-23839", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23839" }, { "name": "CVE-2023-30588", "url": "https://www.cve.org/CVERecord?id=CVE-2023-30588" }, { "name": "CVE-2012-5784", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5784" }, { "name": "CVE-2023-21937", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21937" }, { "name": "CVE-2022-4450", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4450" }, { "name": "CVE-2021-41035", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41035" }, { "name": "CVE-2023-2650", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2650" }, { "name": "CVE-2018-8032", "url": "https://www.cve.org/CVERecord?id=CVE-2018-8032" }, { "name": "CVE-2022-21434", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21434" }, { "name": "CVE-2023-2597", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2597" }, { "name": "CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "name": "CVE-2023-22049", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22049" }, { "name": "CVE-2022-0778", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778" }, { "name": "CVE-2022-41854", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41854" }, { "name": "CVE-2021-35578", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35578" }, { "name": "CVE-2021-28167", "url": "https://www.cve.org/CVERecord?id=CVE-2021-28167" }, { "name": "CVE-2023-5676", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5676" }, { "name": "CVE-2022-2097", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2097" }, { "name": "CVE-2021-31684", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31684" }, { "name": "CVE-2023-46604", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46604" }, { "name": "CVE-2010-2084", "url": "https://www.cve.org/CVERecord?id=CVE-2010-2084" }, { "name": "CVE-2019-0227", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0227" }, { "name": "CVE-2021-3712", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3712" }, { "name": "CVE-2023-21968", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21968" }, { "name": "CVE-2023-21930", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21930" }, { "name": "CVE-2023-24998", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24998" }, { "name": "CVE-2022-34357", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34357" }, { "name": "CVE-2021-35564", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35564" }, { "name": "CVE-2021-23840", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23840" }, { "name": "CVE-2023-46158", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46158" }, { "name": "CVE-2014-3596", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3596" }, { "name": "CVE-2022-21496", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21496" }, { "name": "CVE-2021-35556", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35556" }, { "name": "CVE-2022-1471", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1471" }, { "name": "CVE-2023-26136", "url": "https://www.cve.org/CVERecord?id=CVE-2023-26136" }, { "name": "CVE-2022-21443", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21443" }, { "name": "CVE-2021-23841", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23841" }, { "name": "CVE-2021-35560", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35560" }, { "name": "CVE-2023-51384", "url": "https://www.cve.org/CVERecord?id=CVE-2023-51384" }, { "name": "CVE-2022-34165", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34165" }, { "name": "CVE-2023-30996", "url": "https://www.cve.org/CVERecord?id=CVE-2023-30996" }, { "name": "CVE-2023-3446", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3446" }, { "name": "CVE-2023-21967", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21967" } ], "initial_release_date": "2024-03-01T00:00:00", "last_revision_date": "2024-03-01T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0180", "revisions": [ { "description": "Version initiale", "revision_date": "2024-03-01T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une\n\u00e9l\u00e9vation de privil\u00e8ges.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 7112541 du 23 f\u00e9vrier 2024", "url": "https://www.ibm.com/support/pages/node/7112541" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 7125640 du 28 f\u00e9vrier 2024", "url": "https://www.ibm.com/support/pages/node/7125640" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 7124466 du 28 f\u00e9vrier 2024", "url": "https://www.ibm.com/support/pages/node/7124466" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 7112504 du 28 f\u00e9vrier 2024", "url": "https://www.ibm.com/support/pages/node/7112504" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 7125461 du 28 f\u00e9vrier 2024", "url": "https://www.ibm.com/support/pages/node/7125461" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 7123154 du 23 f\u00e9vrier 2024", "url": "https://www.ibm.com/support/pages/node/7123154" } ] }
CERTFR-2023-AVI-0116
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans les produits IBM. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une injection de code indirecte à distance (XSS) et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct for UNIX versions 6.0.x antérieures à 6.0.0.2.iFix145 | ||
IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct for UNIX versions 6.2.x antérieures à 6.2.0.5.iFix021 | ||
IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct for UNIX versions 4.3.x antérieures à 4.3.0.1.iFix109 | ||
IBM | Sterling | IBM Sterling B2B Integrator version 6.1.0.0 à 6.1.2.0 antérieures à 6.1.2.1 | ||
IBM | Sterling | IBM Sterling B2B Integrator version 6.0.0.0 à 6.0.3.7 antérieures à 6.0.3.8 | ||
IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct for UNIX versions 6.1.x antérieures à 6.1.0.4.iFix077 |
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "IBM Sterling Connect:Direct for UNIX versions 6.0.x ant\u00e9rieures \u00e0 6.0.0.2.iFix145", "product": { "name": "Sterling Connect:Direct", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM Sterling Connect:Direct for UNIX versions 6.2.x ant\u00e9rieures \u00e0 6.2.0.5.iFix021", "product": { "name": "Sterling Connect:Direct", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM Sterling Connect:Direct for UNIX versions 4.3.x ant\u00e9rieures \u00e0 4.3.0.1.iFix109", "product": { "name": "Sterling Connect:Direct", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM Sterling B2B Integrator version 6.1.0.0 \u00e0 6.1.2.0 ant\u00e9rieures \u00e0 6.1.2.1", "product": { "name": "Sterling", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM Sterling B2B Integrator version 6.0.0.0 \u00e0 6.0.3.7 ant\u00e9rieures \u00e0 6.0.3.8", "product": { "name": "Sterling", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM Sterling Connect:Direct for UNIX versions 6.1.x ant\u00e9rieures \u00e0 6.1.0.4.iFix077", "product": { "name": "Sterling Connect:Direct", "vendor": { "name": "IBM", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2021-38875", "url": "https://www.cve.org/CVERecord?id=CVE-2021-38875" }, { "name": "CVE-2022-31772", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31772" }, { "name": "CVE-2019-4378", "url": "https://www.cve.org/CVERecord?id=CVE-2019-4378" }, { "name": "CVE-2019-4465", "url": "https://www.cve.org/CVERecord?id=CVE-2019-4465" }, { "name": "CVE-2020-4320", "url": "https://www.cve.org/CVERecord?id=CVE-2020-4320" }, { "name": "CVE-2019-4049", "url": "https://www.cve.org/CVERecord?id=CVE-2019-4049" }, { "name": "CVE-2019-4277", "url": "https://www.cve.org/CVERecord?id=CVE-2019-4277" }, { "name": "CVE-2021-38949", "url": "https://www.cve.org/CVERecord?id=CVE-2021-38949" }, { "name": "CVE-2020-4319", "url": "https://www.cve.org/CVERecord?id=CVE-2020-4319" }, { "name": "CVE-2019-4055", "url": "https://www.cve.org/CVERecord?id=CVE-2019-4055" }, { "name": "CVE-2022-40231", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40231" }, { "name": "CVE-2020-4682", "url": "https://www.cve.org/CVERecord?id=CVE-2020-4682" }, { "name": "CVE-2022-40232", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40232" }, { "name": "CVE-2022-21626", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21626" }, { "name": "CVE-2020-4375", "url": "https://www.cve.org/CVERecord?id=CVE-2020-4375" }, { "name": "CVE-2020-4267", "url": "https://www.cve.org/CVERecord?id=CVE-2020-4267" }, { "name": "CVE-2023-23477", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23477" }, { "name": "CVE-2019-4614", "url": "https://www.cve.org/CVERecord?id=CVE-2019-4614" }, { "name": "CVE-2019-4762", "url": "https://www.cve.org/CVERecord?id=CVE-2019-4762" }, { "name": "CVE-2021-29843", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29843" }, { "name": "CVE-2019-4655", "url": "https://www.cve.org/CVERecord?id=CVE-2019-4655" }, { "name": "CVE-2020-4338", "url": "https://www.cve.org/CVERecord?id=CVE-2020-4338" }, { "name": "CVE-2019-4656", "url": "https://www.cve.org/CVERecord?id=CVE-2019-4656" }, { "name": "CVE-2022-42004", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42004" }, { "name": "CVE-2019-12415", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12415" }, { "name": "CVE-2022-22970", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22970" }, { "name": "CVE-2022-31159", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31159" }, { "name": "CVE-2019-4560", "url": "https://www.cve.org/CVERecord?id=CVE-2019-4560" }, { "name": "CVE-2022-43579", "url": "https://www.cve.org/CVERecord?id=CVE-2022-43579" }, { "name": "CVE-2022-42003", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42003" }, { "name": "CVE-2019-4619", "url": "https://www.cve.org/CVERecord?id=CVE-2019-4619" }, { "name": "CVE-2019-4261", "url": "https://www.cve.org/CVERecord?id=CVE-2019-4261" }, { "name": "CVE-2019-4719", "url": "https://www.cve.org/CVERecord?id=CVE-2019-4719" }, { "name": "CVE-2022-34165", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34165" }, { "name": "CVE-2020-4465", "url": "https://www.cve.org/CVERecord?id=CVE-2020-4465" } ], "initial_release_date": "2023-02-13T00:00:00", "last_revision_date": "2023-02-13T00:00:00", "links": [ { "title": "Bulletin de s\u00e9curit\u00e9 IBM du 10 f\u00e9vrier 2023", "url": "https://www.ibm.com/support/pages/node/6954767" }, { "title": "Bulletin de s\u00e9curit\u00e9 IBM du 10 f\u00e9vrier 2023", "url": "https://www.ibm.com/support/pages/node/6954771" }, { "title": "Bulletin de s\u00e9curit\u00e9 IBM du 10 f\u00e9vrier 2023", "url": "https://www.ibm.com/support/pages/node/6954763" }, { "title": "Bulletin de s\u00e9curit\u00e9 IBM du 10 f\u00e9vrier 2023", "url": "https://www.ibm.com/support/pages/node/6954765" }, { "title": "Bulletin de s\u00e9curit\u00e9 IBM du 09 f\u00e9vrier 2023", "url": "https://www.ibm.com/support/pages/node/6954465" }, { "title": "Bulletin de s\u00e9curit\u00e9 IBM du 09 f\u00e9vrier 2023", "url": "https://www.ibm.com/support/pages/node/6954471" }, { "title": "Bulletin de s\u00e9curit\u00e9 IBM du 09 f\u00e9vrier 2023", "url": "https://www.ibm.com/support/pages/node/6954453" }, { "title": "Bulletin de s\u00e9curit\u00e9 IBM du 09 f\u00e9vrier 2023", "url": "https://www.ibm.com/support/pages/node/6954469" }, { "title": "Bulletin de s\u00e9curit\u00e9 IBM du 09 f\u00e9vrier 2023", "url": "https://www.ibm.com/support/pages/node/6954467" }, { "title": "Bulletin de s\u00e9curit\u00e9 IBM du 10 f\u00e9vrier 2023", "url": "https://www.ibm.com/support/pages/node/6954727" } ], "reference": "CERTFR-2023-AVI-0116", "revisions": [ { "description": "Version initiale", "revision_date": "2023-02-13T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits \u003cspan\nclass=\"textit\"\u003eIBM\u003c/span\u003e. Elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, une injection de code\nindirecte \u00e0 distance (XSS) et une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 6954763 du 10 f\u00e9vrier 2023", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 6954453 du 09 f\u00e9vrier 2023", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 6954767 du 10 f\u00e9vrier 2023", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 6954771 du 10 f\u00e9vrier 2023", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 6954469 du 09 f\u00e9vrier 2023", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 6954765 du 10 f\u00e9vrier 2023", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 6954471 du 09 f\u00e9vrier 2023", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 6954727 du 10 f\u00e9vrier 2023", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 6954467 du 09 f\u00e9vrier 2023", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 6954465 du 09 f\u00e9vrier 2023", "url": null } ] }
CERTFR-2023-AVI-0110
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans IBM. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, un contournement de la politique de sécurité, un déni de service à distance, une exécution de code arbitraire à distance, une atteinte à l'intégrité des données et une injection de code indirecte à distance (XSS).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct pour Microsoft Windows versions 6.1.0.x antérieures à 6.1.0.2_iFix054 | ||
IBM | WebSphere | IBM WebSphere Application Server Liberty versions 21.0.0.12 à 23.0.0.x sans le correctif de sécurité temporaire PH52079 ou antérieures à 23.0.0.2 (disponible au premier trimestre 2023) | ||
IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct pour Microsoft Windows versions 6.0.0.x antérieures à 6.0.0.4_iFix060 | ||
IBM | AIX | IBM AIX versions 7.3.x sans le dernier correctif de sécurité | ||
IBM | Sterling | IBM Sterling Global Mailbox versions 6.0.3.x antérieures à 6.0.3.8 | ||
IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct pour Microsoft Windows versions 6.2.0.x antérieures à 6.2.0.4_iFix020 | ||
IBM | VIOS | IBM VIOS versions 3.1.x sans le dernier correctif de sécurité | ||
IBM | Sterling | IBM Sterling Global Mailbox versions 6.1.2.x antérieures à 6.1.2.1 | ||
IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct pour Microsoft Windows versions 4.8.0.x antérieures à 4.8.0.3_iFix052 | ||
IBM | Db2 | IBM Db2 versions 11.1.x antérieures à 11.1.4 FP7 | ||
IBM | AIX | IBM AIX versions 7.2.x sans le dernier correctif de sécurité | ||
IBM | Db2 | IBM Db2 versions 11.5.x antérieures à 11.5.8 | ||
IBM | WebSphere | IBM WebSphere Application Server Liberty versions 17.0.0.3 à 23.0.0.x sans le correctif de sécurité temporaire PH52095 ou antérieures à 23.0.0.2 (disponible au premier trimestre 2023) | ||
IBM | Db2 | IBM Db2 versions 10.5 antérieures à 10.5 FP11 |
Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "IBM Sterling Connect:Direct pour Microsoft Windows versions 6.1.0.x ant\u00e9rieures \u00e0 6.1.0.2_iFix054", "product": { "name": "Sterling Connect:Direct", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM WebSphere Application Server Liberty versions 21.0.0.12 \u00e0 23.0.0.x sans le correctif de s\u00e9curit\u00e9 temporaire PH52079 ou ant\u00e9rieures \u00e0 23.0.0.2 (disponible au premier trimestre 2023)", "product": { "name": "WebSphere", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM Sterling Connect:Direct pour Microsoft Windows versions 6.0.0.x ant\u00e9rieures \u00e0 6.0.0.4_iFix060", "product": { "name": "Sterling Connect:Direct", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM AIX versions 7.3.x sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "AIX", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM Sterling Global Mailbox versions 6.0.3.x ant\u00e9rieures \u00e0 6.0.3.8", "product": { "name": "Sterling", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM Sterling Connect:Direct pour Microsoft Windows versions 6.2.0.x ant\u00e9rieures \u00e0 6.2.0.4_iFix020", "product": { "name": "Sterling Connect:Direct", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM VIOS versions 3.1.x sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "VIOS", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM Sterling Global Mailbox versions 6.1.2.x ant\u00e9rieures \u00e0 6.1.2.1", "product": { "name": "Sterling", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM Sterling Connect:Direct pour Microsoft Windows versions 4.8.0.x ant\u00e9rieures \u00e0 4.8.0.3_iFix052", "product": { "name": "Sterling Connect:Direct", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM Db2 versions 11.1.x ant\u00e9rieures \u00e0 11.1.4 FP7", "product": { "name": "Db2", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM AIX versions 7.2.x sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "AIX", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM Db2 versions 11.5.x ant\u00e9rieures \u00e0 11.5.8", "product": { "name": "Db2", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM WebSphere Application Server Liberty versions 17.0.0.3 \u00e0 23.0.0.x sans le correctif de s\u00e9curit\u00e9 temporaire PH52095 ou ant\u00e9rieures \u00e0 23.0.0.2 (disponible au premier trimestre 2023)", "product": { "name": "WebSphere", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM Db2 versions 10.5 ant\u00e9rieures \u00e0 10.5 FP11", "product": { "name": "Db2", "vendor": { "name": "IBM", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2022-43927", "url": "https://www.cve.org/CVERecord?id=CVE-2022-43927" }, { "name": "CVE-2020-13956", "url": "https://www.cve.org/CVERecord?id=CVE-2020-13956" }, { "name": "CVE-2022-46364", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46364" }, { "name": "CVE-2022-40303", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40303" }, { "name": "CVE-2022-45787", "url": "https://www.cve.org/CVERecord?id=CVE-2022-45787" }, { "name": "CVE-2014-3577", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3577" }, { "name": "CVE-2022-43930", "url": "https://www.cve.org/CVERecord?id=CVE-2022-43930" }, { "name": "CVE-2022-43929", "url": "https://www.cve.org/CVERecord?id=CVE-2022-43929" }, { "name": "CVE-2022-42003", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42003" }, { "name": "CVE-2022-40304", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40304" }, { "name": "CVE-2022-34165", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34165" } ], "initial_release_date": "2023-02-09T00:00:00", "last_revision_date": "2023-02-09T00:00:00", "links": [ { "title": "Bulletin de s\u00e9curit\u00e9 IBM\u00a06953763 du 08 f\u00e9vrier 2023", "url": "https://www.ibm.com/support/pages/node/6953763" }, { "title": "Bulletin de s\u00e9curit\u00e9 IBM\u00a06953755 du 08 f\u00e9vrier 2023", "url": "https://www.ibm.com/support/pages/node/6953755" }, { "title": "Bulletin de s\u00e9curit\u00e9 IBM\u00a06954403 du 09 f\u00e9vrier 2023", "url": "https://www.ibm.com/support/pages/node/6954403" }, { "title": "Bulletin de s\u00e9curit\u00e9 IBM\u00a06953825 du 08 f\u00e9vrier 2023", "url": "https://www.ibm.com/support/pages/node/6953825" }, { "title": "Bulletin de s\u00e9curit\u00e9 IBM\u00a06954405 du 09 f\u00e9vrier 2023", "url": "https://www.ibm.com/support/pages/node/6954405" } ], "reference": "CERTFR-2023-AVI-0110", "revisions": [ { "description": "Version initiale", "revision_date": "2023-02-09T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eIBM\u003c/span\u003e. Elles permettent \u00e0 un attaquant de provoquer\nune atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, un contournement de la\npolitique de s\u00e9curit\u00e9, un d\u00e9ni de service \u00e0 distance, une ex\u00e9cution de\ncode arbitraire \u00e0 distance, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et\nune injection de code indirecte \u00e0 distance (XSS).\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 6953593 du 07 f\u00e9vrier 2023", "url": "https://www.ibm.com/support/pages/node/6953593" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 6953779 du 08 f\u00e9vrier 2023", "url": "https://www.ibm.com/support/pages/node/6953779" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 6953757 du 08 f\u00e9vrier 2023", "url": "https://www.ibm.com/support/pages/node/6953757" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 6953755 du 08 f\u00e9vrier 2023", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 6954403 du 09 f\u00e9vrier 2023", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 6953825 du 08 f\u00e9vrier 2023", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 6954405 du 09 f\u00e9vrier 2023", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 6953759 du 08 f\u00e9vrier 2023", "url": "https://www.ibm.com/support/pages/node/6953759" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 6953763 du 08 f\u00e9vrier 2023", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 6954401 du 09 f\u00e9vrier 2023", "url": "https://www.ibm.com/support/pages/node/6954401" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 6953767 du 08 f\u00e9vrier 2023", "url": "https://www.ibm.com/support/pages/node/6953767" } ] }
CERTFR-2023-AVI-0362
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans IBM. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un contournement de la politique de sécurité, une atteinte à la confidentialité des données, une élévation de privilèges, un déni de service à distance et une injection de code indirecte à distance (XSS).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
IBM | Spectrum | IBM Spectrum Virtualize versions 8.2.x antérieures à 8.2.1.17 | ||
IBM | Cognos Analytics | IBM Cognos Analytics versions 11.2.x antérieures à 11.2.4.1 IF1 | ||
IBM | Spectrum | IBM Spectrum Virtualize versions 8.5.x antérieures à 8.5.0.7 ou 8.5.2.3 ou 8.5.4.0 | ||
IBM | Spectrum | IBM Spectrum Virtualize versions 8.4.x antérieures à 8.4.0.10 | ||
IBM | Cognos Analytics | IBM Cognos Analytics versions 11.1.x antérieures à 11.1.7 FP7 | ||
IBM | N/A | IBM Cognos Analytics on Cloud Pak for Data versions 4.0.x antérieures à 4.6.5 | ||
IBM | Spectrum | IBM Spectrum Virtualize versions 8.3.x antérieures à 8.3.1.9 |
Title | Publication Time | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "IBM Spectrum Virtualize versions 8.2.x ant\u00e9rieures \u00e0 8.2.1.17", "product": { "name": "Spectrum", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.4.1 IF1", "product": { "name": "Cognos Analytics", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM Spectrum Virtualize versions 8.5.x ant\u00e9rieures \u00e0 8.5.0.7 ou 8.5.2.3 ou 8.5.4.0", "product": { "name": "Spectrum", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM Spectrum Virtualize versions 8.4.x ant\u00e9rieures \u00e0 8.4.0.10", "product": { "name": "Spectrum", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM Cognos Analytics versions 11.1.x ant\u00e9rieures \u00e0 11.1.7 FP7", "product": { "name": "Cognos Analytics", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM Cognos Analytics on Cloud Pak for Data versions 4.0.x ant\u00e9rieures \u00e0 4.6.5", "product": { "name": "N/A", "vendor": { "name": "IBM", "scada": false } } }, { "description": "IBM Spectrum Virtualize versions 8.3.x ant\u00e9rieures \u00e0 8.3.1.9", "product": { "name": "Spectrum", "vendor": { "name": "IBM", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2021-44906", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44906" }, { "name": "CVE-2022-31129", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31129" }, { "name": "CVE-2022-32213", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32213" }, { "name": "CVE-2022-35256", "url": "https://www.cve.org/CVERecord?id=CVE-2022-35256" }, { "name": "CVE-2015-5237", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5237" }, { "name": "CVE-2022-43887", "url": "https://www.cve.org/CVERecord?id=CVE-2022-43887" }, { "name": "CVE-2021-29469", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29469" }, { "name": "CVE-2022-45061", "url": "https://www.cve.org/CVERecord?id=CVE-2022-45061" }, { "name": "CVE-2022-25647", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25647" }, { "name": "CVE-2022-36364", "url": "https://www.cve.org/CVERecord?id=CVE-2022-36364" }, { "name": "CVE-2022-39135", "url": "https://www.cve.org/CVERecord?id=CVE-2022-39135" }, { "name": "CVE-2022-24434", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24434" }, { "name": "CVE-2022-21680", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21680" }, { "name": "CVE-2022-32212", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32212" }, { "name": "CVE-2021-3516", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3516" }, { "name": "CVE-2022-24728", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24728" }, { "name": "CVE-2022-0185", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0185" }, { "name": "CVE-2023-30441", "url": "https://www.cve.org/CVERecord?id=CVE-2023-30441" }, { "name": "CVE-2022-24729", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24729" }, { "name": "CVE-2020-7789", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7789" }, { "name": "CVE-2022-32215", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32215" }, { "name": "CVE-2022-42004", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42004" }, { "name": "CVE-2021-22569", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22569" }, { "name": "CVE-2022-43548", "url": "https://www.cve.org/CVERecord?id=CVE-2022-43548" }, { "name": "CVE-2022-32214", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32214" }, { "name": "CVE-2022-38900", "url": "https://www.cve.org/CVERecord?id=CVE-2022-38900" }, { "name": "CVE-2022-42003", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42003" }, { "name": "CVE-2022-35255", "url": "https://www.cve.org/CVERecord?id=CVE-2022-35255" }, { "name": "CVE-2022-43883", "url": "https://www.cve.org/CVERecord?id=CVE-2022-43883" }, { "name": "CVE-2022-39160", "url": "https://www.cve.org/CVERecord?id=CVE-2022-39160" }, { "name": "CVE-2022-34165", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34165" }, { "name": "CVE-2021-39036", "url": "https://www.cve.org/CVERecord?id=CVE-2021-39036" }, { "name": "CVE-2022-3171", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3171" }, { "name": "CVE-2022-32223", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32223" }, { "name": "CVE-2022-21681", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21681" }, { "name": "CVE-2022-41881", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41881" }, { "name": "CVE-2020-7598", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7598" }, { "name": "CVE-2021-3518", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3518" }, { "name": "CVE-2022-38708", "url": "https://www.cve.org/CVERecord?id=CVE-2022-38708" } ], "initial_release_date": "2023-05-09T00:00:00", "last_revision_date": "2023-05-09T00:00:00", "links": [], "reference": "CERTFR-2023-AVI-0362", "revisions": [ { "description": "Version initiale", "revision_date": "2023-05-09T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eIBM\u003c/span\u003e. Elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un contournement de la\npolitique de s\u00e9curit\u00e9, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es,\nune \u00e9l\u00e9vation de privil\u00e8ges, un d\u00e9ni de service \u00e0 distance et une\ninjection de code indirecte \u00e0 distance (XSS).\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 6986505 du 05 mai 2023", "url": "https://www.ibm.com/support/pages/node/6986505" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 6988147 du 05 mai 2023", "url": "https://www.ibm.com/support/pages/node/6988147" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 6987769 du 02 mai 2023", "url": "https://www.ibm.com/support/pages/node/6987769" } ] }
CERTFR-2022-AVI-997
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans IBM Tivoli. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "IBM Tivoli Monitoring versions ant\u00e9rieures \u00e0 6.3.0.7 Plus Service Pack 5", "product": { "name": "Tivoli", "vendor": { "name": "IBM", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2021-2163", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2163" }, { "name": "CVE-2022-22473", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22473" }, { "name": "CVE-2022-22477", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22477" }, { "name": "CVE-2022-34336", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34336" }, { "name": "CVE-2022-40674", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40674" }, { "name": "CVE-2022-34165", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34165" } ], "initial_release_date": "2022-11-08T00:00:00", "last_revision_date": "2022-11-08T00:00:00", "links": [], "reference": "CERTFR-2022-AVI-997", "revisions": [ { "description": "Version initiale", "revision_date": "2022-11-08T00:00:00.000000" } ], "risks": [ { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans IBM Tivoli.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des\ndonn\u00e9es et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM Tivoli", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 IBM 6837645 du 07 novembre 2022", "url": "https://www.ibm.com/support/pages/node/6837645" } ] }
wid-sec-w-2022-1342
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM WebSphere Application Server ist ein J2EE-Applikationsserver.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in IBM WebSphere Application Server ausnutzen, um Dateien zu manipulieren.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- MacOS X\n- Windows\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-1342 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1342.json" }, { "category": "self", "summary": "WID-SEC-2022-1342 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1342" }, { "category": "external", "summary": "HCL Article KB0104902 vom 2023-06-05", "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0104902" }, { "category": "external", "summary": "HCL Article KB0104166 vom 2023-05-05", "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0104166" }, { "category": "external", "summary": "IBM Security Bulletin vom 2022-09-07", "url": "https://www.ibm.com/support/pages/node/6618747" }, { "category": "external", "summary": "IBM Security Bulletin 6622055 vom 2022-10-29", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-mq-appliance-is-vulnerable-to-http-header-injection-cve-2022-34165/" }, { "category": "external", "summary": "IBM Security Bulletin 6837645 vom 2022-11-08", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-affect-ibm-tivoli-monitoring-included-websphere-application-server-and-ibm-http-server-used-by-websphere-application-server-3/" }, { "category": "external", "summary": "IBM Security Bulletin 6844859 vom 2022-12-09", "url": "https://www.ibm.com/support/pages/node/6844859" }, { "category": "external", "summary": "IBM Security Bulletin 6844721 vom 2022-12-15", "url": "https://www.ibm.com/support/pages/node/6844721" }, { "category": "external", "summary": "IBM Security Bulletin 6833512 vom 2022-12-21", "url": "https://www.ibm.com/support/pages/node/6847655" }, { "category": "external", "summary": "IBM Security Bulletin 6833196 vom 2022-12-23", "url": "https://www.ibm.com/support/pages/node/6846533" }, { "category": "external", "summary": "IBM Security Bulletin 6827869 vom 2022-12-23", "url": "https://www.ibm.com/support/pages/node/6842075" }, { "category": "external", "summary": "IBM Security Bulletin 6851953 vom 2022-12-28", "url": "https://www.ibm.com/support/pages/node/6851953" }, { "category": "external", "summary": "IBM Security Bulletin 6828833 vom 2022-12-31", "url": "https://www.ibm.com/support/pages/node/6828833" }, { "category": "external", "summary": "IBM Security Bulletin 6852709 vom 2023-01-05", "url": "https://www.ibm.com/support/pages/node/6852709" }, { "category": "external", "summary": "IBM Security Bulletin 6853379 vom 2023-01-06", "url": "https://www.ibm.com/support/pages/node/6853379" }, { "category": "external", "summary": "IBM Security Bulletin 6854451 vom 2023-01-10", "url": "https://www.ibm.com/support/pages/node/6854451" }, { "category": "external", "summary": "HCL Article KB0102570 vom 2023-01-20", "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0102570" }, { "category": "external", "summary": "IBM Security Bulletin 6853357 vom 2023-01-31", "url": "https://www.ibm.com/support/pages/node/6853357" }, { "category": "external", "summary": "IBM Security Bulletin 6953617 vom 2023-02-07", "url": "https://www.ibm.com/support/pages/node/6953617" } ], "source_lang": "en-US", "title": "IBM WebSphere Application Server: Schwachstelle erm\u00f6glicht Manipulation von Dateien", "tracking": { "current_release_date": "2023-06-05T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:34:50.299+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2022-1342", "initial_release_date": "2022-09-07T22:00:00.000+00:00", "revision_history": [ { "date": "2022-09-07T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-10-30T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-11-07T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-12-08T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-12-15T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-12-20T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-12-22T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-12-27T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-01-01T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-01-04T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-01-08T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von IBM und IBM-APAR aufgenommen" }, { "date": "2023-01-10T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-01-19T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von HCL aufgenommen" }, { "date": "2023-01-31T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-02-07T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-05-04T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von HCL aufgenommen" }, { "date": "2023-06-05T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von HCL aufgenommen" } ], "status": "final", "version": "17" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "HCL AppScan Enterprise 10.2.0", "product": { "name": "HCL AppScan Enterprise 10.2.0", "product_id": "T027620", "product_identification_helper": { "cpe": "cpe:/a:hcltech:appscan_enterprise:10.2.0" } } }, { "category": "product_name", "name": "HCL BigFix 10.0.11", "product": { "name": "HCL BigFix 10.0.11", "product_id": "T017428", "product_identification_helper": { "cpe": "cpe:/a:hcltech:bigfix:10.0.0_fp2" } } }, { "category": "product_name", "name": "HCL Commerce 10.2.0", "product": { "name": "HCL Commerce 10.2.0", "product_id": "T019294", "product_identification_helper": { "cpe": "cpe:/a:hcltechsw:commerce:-" } } } ], "category": "vendor", "name": "HCL" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM FileNet Content Manager 5.5.4", "product": { "name": "IBM FileNet Content Manager 5.5.4", "product_id": "782758", "product_identification_helper": { "cpe": "cpe:/a:ibm:filenet_content_manager:5.5.4" } } }, { "category": "product_name", "name": "IBM FileNet Content Manager 5.5.8", "product": { "name": "IBM FileNet Content Manager 5.5.8", "product_id": "T024608", "product_identification_helper": { "cpe": "cpe:/a:ibm:filenet_content_manager:5.5.8" } } }, { "category": "product_name", "name": "IBM FileNet Content Manager 5.5.9", "product": { "name": "IBM FileNet Content Manager 5.5.9", "product_id": "T024609", "product_identification_helper": { "cpe": "cpe:/a:ibm:filenet_content_manager:5.5.9" } } } ], "category": "product_name", "name": "FileNet Content Manager" }, { "branches": [ { "category": "product_name", "name": "IBM InfoSphere Identity Insight 9.0", "product": { "name": "IBM InfoSphere Identity Insight 9.0", "product_id": "723109", "product_identification_helper": { "cpe": "cpe:/a:ibm:infosphere_identity_insight:9.0" } } }, { "category": "product_name", "name": "IBM InfoSphere Identity Insight 9.1", "product": { "name": "IBM InfoSphere Identity Insight 9.1", "product_id": "T024310", "product_identification_helper": { "cpe": "cpe:/a:ibm:infosphere_identity_insight:9.1" } } }, { "category": "product_name", "name": "IBM InfoSphere Identity Insight 10.0", "product": { "name": "IBM InfoSphere Identity Insight 10.0", "product_id": "T024311", "product_identification_helper": { "cpe": "cpe:/a:ibm:infosphere_identity_insight:10.0" } } } ], "category": "product_name", "name": "InfoSphere Identity Insight" }, { "category": "product_name", "name": "IBM InfoSphere Information Server 11.7", "product": { "name": "IBM InfoSphere Information Server 11.7", "product_id": "444803", "product_identification_helper": { "cpe": "cpe:/a:ibm:infosphere_information_server:11.7" } } }, { "category": "product_name", "name": "IBM License Metric Tool \u003c 9.2.30", "product": { "name": "IBM License Metric Tool \u003c 9.2.30", "product_id": "T025720", "product_identification_helper": { "cpe": "cpe:/a:ibm:license_metric_tool:9.2.30" } } }, { "category": "product_name", "name": "IBM MQ", "product": { "name": "IBM MQ", "product_id": "T021398", "product_identification_helper": { "cpe": "cpe:/a:ibm:mq:-" } } }, { "category": "product_name", "name": "IBM SPSS", "product": { "name": "IBM SPSS", "product_id": "T013570", "product_identification_helper": { "cpe": "cpe:/a:ibm:spss:-" } } }, { "category": "product_name", "name": "IBM Security Verify Access 10.0.x", "product": { "name": "IBM Security Verify Access 10.0.x", "product_id": "T026175", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_verify_access:10.0.x" } } }, { "branches": [ { "category": "product_name", "name": "IBM Spectrum Protect Operations Center", "product": { "name": "IBM Spectrum Protect Operations Center", "product_id": "T025674", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect:operations_center" } } }, { "category": "product_name", "name": "IBM Spectrum Protect Client Management Service", "product": { "name": "IBM Spectrum Protect Client Management Service", "product_id": "T025675", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect:client_management_service" } } }, { "category": "product_name", "name": "IBM Spectrum Protect for Virtual Environments", "product": { "name": "IBM Spectrum Protect for Virtual Environments", "product_id": "T025697", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect:for_virtual_environments" } } }, { "category": "product_name", "name": "IBM Spectrum Protect for Space Management Client", "product": { "name": "IBM Spectrum Protect for Space Management Client", "product_id": "T025698", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect:for_space_management_client" } } } ], "category": "product_name", "name": "Spectrum Protect" }, { "category": "product_name", "name": "IBM Spectrum Scale", "product": { "name": "IBM Spectrum Scale", "product_id": "T019402", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_scale:-" } } }, { "branches": [ { "category": "product_name", "name": "IBM TXSeries for Multiplatforms 9.1", "product": { "name": "IBM TXSeries for Multiplatforms 9.1", "product_id": "T015903", "product_identification_helper": { "cpe": "cpe:/a:ibm:txseries:for_multiplatforms_9.1" } } }, { "category": "product_name", "name": "IBM TXSeries for Multiplatforms 8.2", "product": { "name": "IBM TXSeries for Multiplatforms 8.2", "product_id": "T015904", "product_identification_helper": { "cpe": "cpe:/a:ibm:txseries:for_multiplatforms_8.2" } } }, { "category": "product_name", "name": "IBM TXSeries for Multiplatforms 8.1", "product": { "name": "IBM TXSeries for Multiplatforms 8.1", "product_id": "T015905", "product_identification_helper": { "cpe": "cpe:/a:ibm:txseries:for_multiplatforms_8.1" } } } ], "category": "product_name", "name": "TXSeries" }, { "category": "product_name", "name": "IBM Tivoli Monitoring", "product": { "name": "IBM Tivoli Monitoring", "product_id": "T000066", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_monitoring:6" } } }, { "branches": [ { "category": "product_name", "name": "IBM WebSphere Application Server 8.0", "product": { "name": "IBM WebSphere Application Server 8.0", "product_id": "389357", "product_identification_helper": { "cpe": "cpe:/a:ibm:websphere_application_server:8.0" } } }, { "category": "product_name", "name": "IBM WebSphere Application Server 8.5", "product": { "name": "IBM WebSphere Application Server 8.5", "product_id": "703851", "product_identification_helper": { "cpe": "cpe:/a:ibm:websphere_application_server:8.5" } } }, { "category": "product_name", "name": "IBM WebSphere Application Server 9.0", "product": { "name": "IBM WebSphere Application Server 9.0", "product_id": "703852", "product_identification_helper": { "cpe": "cpe:/a:ibm:websphere_application_server:9.0" } } }, { "category": "product_name", "name": "IBM WebSphere Application Server 7.0", "product": { "name": "IBM WebSphere Application Server 7.0", "product_id": "92986", "product_identification_helper": { "cpe": "cpe:/a:ibm:websphere_application_server:7.0" } } }, { "category": "product_name", "name": "IBM WebSphere Application Server liberty", "product": { "name": "IBM WebSphere Application Server liberty", "product_id": "T011504", "product_identification_helper": { "cpe": "cpe:/a:ibm:websphere_application_server:liberty" } } } ], "category": "product_name", "name": "WebSphere Application Server" } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-34165", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in IBM WebSphere Application Server. Nutzereingaben werden nur ungen\u00fcgend validiert, was eine HTTP Header Injection erm\u00f6glicht. Ein authentisierter Angreifer kann diese Schwachstelle ausnutzen, um unterschiedliche Angriffe, wie z.B. Cache Poisoning oder Cross Site Scripting, auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T011504", "T015905", "T015904", "T015903", "92986", "T019294", "703851", "703852", "782758", "389357", "T025675", "T025697", "T025674", "T025698", "T021398", "T026175", "T024609", "T024608", "T013570", "723109", "T019402", "444803", "T017428", "T024311", "T024310", "T000066", "T025720", "T027620" ] }, "release_date": "2022-09-07T22:00:00.000+00:00", "title": "CVE-2022-34165" } ] }
WID-SEC-W-2022-1342
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM WebSphere Application Server ist ein J2EE-Applikationsserver.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in IBM WebSphere Application Server ausnutzen, um Dateien zu manipulieren.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- MacOS X\n- Windows\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-1342 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1342.json" }, { "category": "self", "summary": "WID-SEC-2022-1342 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1342" }, { "category": "external", "summary": "HCL Article KB0104902 vom 2023-06-05", "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0104902" }, { "category": "external", "summary": "HCL Article KB0104166 vom 2023-05-05", "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0104166" }, { "category": "external", "summary": "IBM Security Bulletin vom 2022-09-07", "url": "https://www.ibm.com/support/pages/node/6618747" }, { "category": "external", "summary": "IBM Security Bulletin 6622055 vom 2022-10-29", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-mq-appliance-is-vulnerable-to-http-header-injection-cve-2022-34165/" }, { "category": "external", "summary": "IBM Security Bulletin 6837645 vom 2022-11-08", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-affect-ibm-tivoli-monitoring-included-websphere-application-server-and-ibm-http-server-used-by-websphere-application-server-3/" }, { "category": "external", "summary": "IBM Security Bulletin 6844859 vom 2022-12-09", "url": "https://www.ibm.com/support/pages/node/6844859" }, { "category": "external", "summary": "IBM Security Bulletin 6844721 vom 2022-12-15", "url": "https://www.ibm.com/support/pages/node/6844721" }, { "category": "external", "summary": "IBM Security Bulletin 6833512 vom 2022-12-21", "url": "https://www.ibm.com/support/pages/node/6847655" }, { "category": "external", "summary": "IBM Security Bulletin 6833196 vom 2022-12-23", "url": "https://www.ibm.com/support/pages/node/6846533" }, { "category": "external", "summary": "IBM Security Bulletin 6827869 vom 2022-12-23", "url": "https://www.ibm.com/support/pages/node/6842075" }, { "category": "external", "summary": "IBM Security Bulletin 6851953 vom 2022-12-28", "url": "https://www.ibm.com/support/pages/node/6851953" }, { "category": "external", "summary": "IBM Security Bulletin 6828833 vom 2022-12-31", "url": "https://www.ibm.com/support/pages/node/6828833" }, { "category": "external", "summary": "IBM Security Bulletin 6852709 vom 2023-01-05", "url": "https://www.ibm.com/support/pages/node/6852709" }, { "category": "external", "summary": "IBM Security Bulletin 6853379 vom 2023-01-06", "url": "https://www.ibm.com/support/pages/node/6853379" }, { "category": "external", "summary": "IBM Security Bulletin 6854451 vom 2023-01-10", "url": "https://www.ibm.com/support/pages/node/6854451" }, { "category": "external", "summary": "HCL Article KB0102570 vom 2023-01-20", "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0102570" }, { "category": "external", "summary": "IBM Security Bulletin 6853357 vom 2023-01-31", "url": "https://www.ibm.com/support/pages/node/6853357" }, { "category": "external", "summary": "IBM Security Bulletin 6953617 vom 2023-02-07", "url": "https://www.ibm.com/support/pages/node/6953617" } ], "source_lang": "en-US", "title": "IBM WebSphere Application Server: Schwachstelle erm\u00f6glicht Manipulation von Dateien", "tracking": { "current_release_date": "2023-06-05T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:34:50.299+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2022-1342", "initial_release_date": "2022-09-07T22:00:00.000+00:00", "revision_history": [ { "date": "2022-09-07T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-10-30T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-11-07T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-12-08T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-12-15T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-12-20T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-12-22T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-12-27T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-01-01T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-01-04T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-01-08T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von IBM und IBM-APAR aufgenommen" }, { "date": "2023-01-10T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-01-19T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von HCL aufgenommen" }, { "date": "2023-01-31T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-02-07T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-05-04T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von HCL aufgenommen" }, { "date": "2023-06-05T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von HCL aufgenommen" } ], "status": "final", "version": "17" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "HCL AppScan Enterprise 10.2.0", "product": { "name": "HCL AppScan Enterprise 10.2.0", "product_id": "T027620", "product_identification_helper": { "cpe": "cpe:/a:hcltech:appscan_enterprise:10.2.0" } } }, { "category": "product_name", "name": "HCL BigFix 10.0.11", "product": { "name": "HCL BigFix 10.0.11", "product_id": "T017428", "product_identification_helper": { "cpe": "cpe:/a:hcltech:bigfix:10.0.0_fp2" } } }, { "category": "product_name", "name": "HCL Commerce 10.2.0", "product": { "name": "HCL Commerce 10.2.0", "product_id": "T019294", "product_identification_helper": { "cpe": "cpe:/a:hcltechsw:commerce:-" } } } ], "category": "vendor", "name": "HCL" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM FileNet Content Manager 5.5.4", "product": { "name": "IBM FileNet Content Manager 5.5.4", "product_id": "782758", "product_identification_helper": { "cpe": "cpe:/a:ibm:filenet_content_manager:5.5.4" } } }, { "category": "product_name", "name": "IBM FileNet Content Manager 5.5.8", "product": { "name": "IBM FileNet Content Manager 5.5.8", "product_id": "T024608", "product_identification_helper": { "cpe": "cpe:/a:ibm:filenet_content_manager:5.5.8" } } }, { "category": "product_name", "name": "IBM FileNet Content Manager 5.5.9", "product": { "name": "IBM FileNet Content Manager 5.5.9", "product_id": "T024609", "product_identification_helper": { "cpe": "cpe:/a:ibm:filenet_content_manager:5.5.9" } } } ], "category": "product_name", "name": "FileNet Content Manager" }, { "branches": [ { "category": "product_name", "name": "IBM InfoSphere Identity Insight 9.0", "product": { "name": "IBM InfoSphere Identity Insight 9.0", "product_id": "723109", "product_identification_helper": { "cpe": "cpe:/a:ibm:infosphere_identity_insight:9.0" } } }, { "category": "product_name", "name": "IBM InfoSphere Identity Insight 9.1", "product": { "name": "IBM InfoSphere Identity Insight 9.1", "product_id": "T024310", "product_identification_helper": { "cpe": "cpe:/a:ibm:infosphere_identity_insight:9.1" } } }, { "category": "product_name", "name": "IBM InfoSphere Identity Insight 10.0", "product": { "name": "IBM InfoSphere Identity Insight 10.0", "product_id": "T024311", "product_identification_helper": { "cpe": "cpe:/a:ibm:infosphere_identity_insight:10.0" } } } ], "category": "product_name", "name": "InfoSphere Identity Insight" }, { "category": "product_name", "name": "IBM InfoSphere Information Server 11.7", "product": { "name": "IBM InfoSphere Information Server 11.7", "product_id": "444803", "product_identification_helper": { "cpe": "cpe:/a:ibm:infosphere_information_server:11.7" } } }, { "category": "product_name", "name": "IBM License Metric Tool \u003c 9.2.30", "product": { "name": "IBM License Metric Tool \u003c 9.2.30", "product_id": "T025720", "product_identification_helper": { "cpe": "cpe:/a:ibm:license_metric_tool:9.2.30" } } }, { "category": "product_name", "name": "IBM MQ", "product": { "name": "IBM MQ", "product_id": "T021398", "product_identification_helper": { "cpe": "cpe:/a:ibm:mq:-" } } }, { "category": "product_name", "name": "IBM SPSS", "product": { "name": "IBM SPSS", "product_id": "T013570", "product_identification_helper": { "cpe": "cpe:/a:ibm:spss:-" } } }, { "category": "product_name", "name": "IBM Security Verify Access 10.0.x", "product": { "name": "IBM Security Verify Access 10.0.x", "product_id": "T026175", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_verify_access:10.0.x" } } }, { "branches": [ { "category": "product_name", "name": "IBM Spectrum Protect Operations Center", "product": { "name": "IBM Spectrum Protect Operations Center", "product_id": "T025674", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect:operations_center" } } }, { "category": "product_name", "name": "IBM Spectrum Protect Client Management Service", "product": { "name": "IBM Spectrum Protect Client Management Service", "product_id": "T025675", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect:client_management_service" } } }, { "category": "product_name", "name": "IBM Spectrum Protect for Virtual Environments", "product": { "name": "IBM Spectrum Protect for Virtual Environments", "product_id": "T025697", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect:for_virtual_environments" } } }, { "category": "product_name", "name": "IBM Spectrum Protect for Space Management Client", "product": { "name": "IBM Spectrum Protect for Space Management Client", "product_id": "T025698", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect:for_space_management_client" } } } ], "category": "product_name", "name": "Spectrum Protect" }, { "category": "product_name", "name": "IBM Spectrum Scale", "product": { "name": "IBM Spectrum Scale", "product_id": "T019402", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_scale:-" } } }, { "branches": [ { "category": "product_name", "name": "IBM TXSeries for Multiplatforms 9.1", "product": { "name": "IBM TXSeries for Multiplatforms 9.1", "product_id": "T015903", "product_identification_helper": { "cpe": "cpe:/a:ibm:txseries:for_multiplatforms_9.1" } } }, { "category": "product_name", "name": "IBM TXSeries for Multiplatforms 8.2", "product": { "name": "IBM TXSeries for Multiplatforms 8.2", "product_id": "T015904", "product_identification_helper": { "cpe": "cpe:/a:ibm:txseries:for_multiplatforms_8.2" } } }, { "category": "product_name", "name": "IBM TXSeries for Multiplatforms 8.1", "product": { "name": "IBM TXSeries for Multiplatforms 8.1", "product_id": "T015905", "product_identification_helper": { "cpe": "cpe:/a:ibm:txseries:for_multiplatforms_8.1" } } } ], "category": "product_name", "name": "TXSeries" }, { "category": "product_name", "name": "IBM Tivoli Monitoring", "product": { "name": "IBM Tivoli Monitoring", "product_id": "T000066", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_monitoring:6" } } }, { "branches": [ { "category": "product_name", "name": "IBM WebSphere Application Server 8.0", "product": { "name": "IBM WebSphere Application Server 8.0", "product_id": "389357", "product_identification_helper": { "cpe": "cpe:/a:ibm:websphere_application_server:8.0" } } }, { "category": "product_name", "name": "IBM WebSphere Application Server 8.5", "product": { "name": "IBM WebSphere Application Server 8.5", "product_id": "703851", "product_identification_helper": { "cpe": "cpe:/a:ibm:websphere_application_server:8.5" } } }, { "category": "product_name", "name": "IBM WebSphere Application Server 9.0", "product": { "name": "IBM WebSphere Application Server 9.0", "product_id": "703852", "product_identification_helper": { "cpe": "cpe:/a:ibm:websphere_application_server:9.0" } } }, { "category": "product_name", "name": "IBM WebSphere Application Server 7.0", "product": { "name": "IBM WebSphere Application Server 7.0", "product_id": "92986", "product_identification_helper": { "cpe": "cpe:/a:ibm:websphere_application_server:7.0" } } }, { "category": "product_name", "name": "IBM WebSphere Application Server liberty", "product": { "name": "IBM WebSphere Application Server liberty", "product_id": "T011504", "product_identification_helper": { "cpe": "cpe:/a:ibm:websphere_application_server:liberty" } } } ], "category": "product_name", "name": "WebSphere Application Server" } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-34165", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in IBM WebSphere Application Server. Nutzereingaben werden nur ungen\u00fcgend validiert, was eine HTTP Header Injection erm\u00f6glicht. Ein authentisierter Angreifer kann diese Schwachstelle ausnutzen, um unterschiedliche Angriffe, wie z.B. Cache Poisoning oder Cross Site Scripting, auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T011504", "T015905", "T015904", "T015903", "92986", "T019294", "703851", "703852", "782758", "389357", "T025675", "T025697", "T025674", "T025698", "T021398", "T026175", "T024609", "T024608", "T013570", "723109", "T019402", "444803", "T017428", "T024311", "T024310", "T000066", "T025720", "T027620" ] }, "release_date": "2022-09-07T22:00:00.000+00:00", "title": "CVE-2022-34165" } ] }
fkie_cve-2022-34165
Vulnerability from fkie_nvd
URL | Tags | ||
---|---|---|---|
psirt@us.ibm.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/229429 | VDB Entry, Vendor Advisory | |
psirt@us.ibm.com | https://www.ibm.com/support/pages/node/6618747 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/229429 | VDB Entry, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.ibm.com/support/pages/node/6618747 | Patch, Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
ibm | websphere_application_server | * | |
ibm | websphere_application_server | * | |
ibm | websphere_application_server | * | |
ibm | websphere_application_server | * | |
ibm | websphere_application_server | * | |
apple | macos | - | |
hp | hp-ux | - | |
ibm | aix | - | |
ibm | i | - | |
ibm | z\/os | - | |
linux | linux_kernel | - | |
microsoft | windows | - | |
oracle | solaris | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "9FBC4C46-A044-4A5C-80EF-2BCBF9351CEB", "versionEndIncluding": "7.0.0.45", "versionStartIncluding": "7.0.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "E596AE8A-34AD-43F3-A97E-DC79CE517C8B", "versionEndIncluding": "8.0.0.15", "versionStartIncluding": "8.0.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "27F39A37-71C5-4498-9505-4730DA63978F", "versionEndIncluding": "8.5.5.22", "versionStartIncluding": "8.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D22980A-8DA4-4E08-9140-23E24B141939", "versionEndIncluding": "9.0.5.13", "versionStartIncluding": "9.0.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:liberty:*:*:*", "matchCriteriaId": "915EF429-C292-4100-B22B-D7F84E644592", "versionEndExcluding": "22.0.0.9", "versionStartIncluding": "17.0.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false }, { "criteria": "cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*", "matchCriteriaId": "F480AA32-841A-4E68-9343-B2E7548B0A0C", "vulnerable": false }, { "criteria": "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*", "matchCriteriaId": "E492C463-D76E-49B7-A4D4-3B499E422D89", "vulnerable": false }, { "criteria": "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*", "matchCriteriaId": "C684FC45-C9BA-4EF0-BD06-BB289450DD21", "vulnerable": false }, { "criteria": "cpe:2.3:o:ibm:z\\/os:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E97A964-6F9E-4C87-9B90-21AE2C1DF52F", "vulnerable": false }, { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false }, { "criteria": "cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:-:*", "matchCriteriaId": "F5027746-8216-452D-83C5-2F8E9546F2A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 and IBM WebSphere Application Server Liberty 17.0.0.3 through 22.0.0.9 are vulnerable to HTTP header injection, caused by improper validation. This could allow an attacker to conduct various attacks against the vulnerable system, including cache poisoning and cross-site scripting. IBM X-Force ID: 229429." }, { "lang": "es", "value": "IBM WebSphere Application Server versiones 7.0, 8.0, 8.5 y 9.0 e IBM WebSphere Application Server Liberty versiones 17.0.0.3 a 22.0.0.9 son vulnerables a una inyecci\u00f3n de encabezados HTTP, causada por una comprobaci\u00f3n inapropiada. Esto podr\u00eda permitir a un atacante conducir varios ataques contra el sistema vulnerable, incluyendo el envenenamiento de la cach\u00e9 y ataques de tipo cross-site scripting. ID de IBM X-Force ID: 229429" } ], "id": "CVE-2022-34165", "lastModified": "2024-11-21T07:08:59.023", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "psirt@us.ibm.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-09-09T16:15:08.933", "references": [ { "source": "psirt@us.ibm.com", "tags": [ "VDB Entry", "Vendor Advisory" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/229429" }, { "source": "psirt@us.ibm.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.ibm.com/support/pages/node/6618747" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "VDB Entry", "Vendor Advisory" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/229429" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.ibm.com/support/pages/node/6618747" } ], "sourceIdentifier": "psirt@us.ibm.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-74" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2022-34165
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2022-34165", "description": "IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 and IBM WebSphere Application Server Liberty 17.0.0.3 through 22.0.0.9 are vulnerable to HTTP header injection, caused by improper validation. This could allow an attacker to conduct various attacks against the vulnerable system, including cache poisoning and cross-site scripting. IBM X-Force ID: 229429.", "id": "GSD-2022-34165" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2022-34165" ], "details": "IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 and IBM WebSphere Application Server Liberty 17.0.0.3 through 22.0.0.9 are vulnerable to HTTP header injection, caused by improper validation. This could allow an attacker to conduct various attacks against the vulnerable system, including cache poisoning and cross-site scripting. IBM X-Force ID: 229429.", "id": "GSD-2022-34165", "modified": "2023-12-13T01:19:18.918342Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2022-09-07T00:00:00", "ID": "CVE-2022-34165", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WebSphere Application Server", "version": { "version_data": [ { "version_value": "7.0" }, { "version_value": "8.0" }, { "version_value": "8.5" }, { "version_value": "9.0" } ] } }, { "product_name": "WebSphere Application Server Liberty", "version": { "version_data": [ { "version_value": "17.0.0.3" }, { "version_value": "22.0.0.9" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 and IBM WebSphere Application Server Liberty 17.0.0.3 through 22.0.0.9 are vulnerable to HTTP header injection, caused by improper validation. This could allow an attacker to conduct various attacks against the vulnerable system, including cache poisoning and cross-site scripting. IBM X-Force ID: 229429." } ] }, "impact": { "cvssv3": { "BM": { "A": "N", "AC": "L", "AV": "N", "C": "L", "I": "L", "PR": "L", "S": "U", "SCORE": "5.400", "UI": "N" }, "TM": { "E": "U", "RC": "C", "RL": "O" } } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Gain Access" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ibm.com/support/pages/node/6618747", "refsource": "CONFIRM", "title": "IBM Security Bulletin 6618747 (WebSphere Application Server Liberty)", "url": "https://www.ibm.com/support/pages/node/6618747" }, { "name": "ibm-websphere-cve202234165-http-injection (229429)", "refsource": "XF", "title": "X-Force Vulnerability Report", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/229429" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.0.0.45", "versionStartIncluding": "7.0.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.0.0.15", "versionStartIncluding": "8.0.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.5.5.22", "versionStartIncluding": "8.5.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "9.0.5.13", "versionStartIncluding": "9.0.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:liberty:*:*:*", "cpe_name": [], "versionEndExcluding": "22.0.0.9", "versionStartIncluding": "17.0.0.3", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:ibm:z\\/os:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:-:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "ID": "CVE-2022-34165" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 and IBM WebSphere Application Server Liberty 17.0.0.3 through 22.0.0.9 are vulnerable to HTTP header injection, caused by improper validation. This could allow an attacker to conduct various attacks against the vulnerable system, including cache poisoning and cross-site scripting. IBM X-Force ID: 229429." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "ibm-websphere-cve202234165-http-injection (229429)", "refsource": "XF", "tags": [ "VDB Entry", "Vendor Advisory" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/229429" }, { "name": "https://www.ibm.com/support/pages/node/6618747", "refsource": "CONFIRM", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.ibm.com/support/pages/node/6618747" } ] } }, "impact": { "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.5 } }, "lastModifiedDate": "2022-09-14T18:25Z", "publishedDate": "2022-09-09T16:15Z" } } }
ghsa-76w3-wr72-rh8j
Vulnerability from github
IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 and IBM WebSphere Application Server Liberty 17.0.0.3 through 22.0.0.9 are vulnerable to HTTP header injection, caused by improper validation. This could allow an attacker to conduct various attacks against the vulnerable system, including cache poisoning and cross-site scripting. IBM X-Force ID: 229429.
{ "affected": [], "aliases": [ "CVE-2022-34165" ], "database_specific": { "cwe_ids": [ "CWE-20" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-09-09T16:15:00Z", "severity": "MODERATE" }, "details": "IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 and IBM WebSphere Application Server Liberty 17.0.0.3 through 22.0.0.9 are vulnerable to HTTP header injection, caused by improper validation. This could allow an attacker to conduct various attacks against the vulnerable system, including cache poisoning and cross-site scripting. IBM X-Force ID: 229429.", "id": "GHSA-76w3-wr72-rh8j", "modified": "2022-09-15T00:00:19Z", "published": "2022-09-10T00:00:26Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34165" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/229429" }, { "type": "WEB", "url": "https://www.ibm.com/support/pages/node/6618747" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "type": "CVSS_V3" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.