cnvd-2017-05686
Vulnerability from cnvd
Title
IBM API Connect命令执行漏洞
Description
IBM API Connect是一套用于管理API生命周期的集成解决方案,IBM NPM是一套NodeJS包管理和分发工具。 IBM API Connect存在命令执行漏洞。攻击者可以利用此漏洞在受影响的系统上执行任意命令。
Severity
Patch Name
IBM API Connect命令执行漏洞的补丁
Patch Description
IBM API Connect是一套用于管理API生命周期的集成解决方案,IBM NPM是一套NodeJS包管理和分发工具。 IBM API Connect存在命令执行漏洞。攻击者可以利用此漏洞在受影响的系统上执行任意命令。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

用户可联系供应商获得补丁信息: https://www.ibm.com/

Reference
http://www.securityfocus.com/bid/97665
Impacted products
Name
IBM API Connect 5
Show details on source website


{
  "bids": {
    "bid": {
      "bidNumber": "97665"
    }
  },
  "cves": {
    "cve": {
      "cveNumber": "CVE-2017-1161"
    }
  },
  "description": "IBM API Connect\u662f\u4e00\u5957\u7528\u4e8e\u7ba1\u7406API\u751f\u547d\u5468\u671f\u7684\u96c6\u6210\u89e3\u51b3\u65b9\u6848\uff0cIBM NPM\u662f\u4e00\u5957NodeJS\u5305\u7ba1\u7406\u548c\u5206\u53d1\u5de5\u5177\u3002\r\n\r\nIBM API Connect\u5b58\u5728\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6b64\u6f0f\u6d1e\u5728\u53d7\u5f71\u54cd\u7684\u7cfb\u7edf\u4e0a\u6267\u884c\u4efb\u610f\u547d\u4ee4\u3002",
  "discovererName": "IBM",
  "formalWay": "\u7528\u6237\u53ef\u8054\u7cfb\u4f9b\u5e94\u5546\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a\r\nhttps://www.ibm.com/",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2017-05686",
  "openTime": "2017-05-01",
  "patchDescription": "IBM API Connect\u662f\u4e00\u5957\u7528\u4e8e\u7ba1\u7406API\u751f\u547d\u5468\u671f\u7684\u96c6\u6210\u89e3\u51b3\u65b9\u6848\uff0cIBM NPM\u662f\u4e00\u5957NodeJS\u5305\u7ba1\u7406\u548c\u5206\u53d1\u5de5\u5177\u3002\r\n\r\nIBM API Connect\u5b58\u5728\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6b64\u6f0f\u6d1e\u5728\u53d7\u5f71\u54cd\u7684\u7cfb\u7edf\u4e0a\u6267\u884c\u4efb\u610f\u547d\u4ee4\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "IBM API Connect\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": "IBM API Connect 5"
  },
  "referenceLink": "http://www.securityfocus.com/bid/97665",
  "serverity": "\u9ad8",
  "submitTime": "2017-04-17",
  "title": "IBM API Connect\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…