cnvd-2021-36324
Vulnerability from cnvd
Title: IBM Cloud Pak for Security恶意数据注入漏洞
Description:
IBM Cloud Pak for Security是美国IBM公司的一款应用软件。一个开放的安全平台,可连接到您现有的数据源以产生更深刻的见解,并使您能够更快地采取自动化行动。
IBM Cloud Pak for Security 1.4.0.0、1.5.0.0、1.5.0.1、1.6.0.0和1.6.0.1版本存在恶意数据注入漏洞。该漏洞源于未能对用户输入的数据进行过滤,攻击者可利用该漏洞使用特制HTTP请求注入恶意数据。
Severity: 中
Patch Name: IBM Cloud Pak for Security恶意数据注入漏洞的补丁
Patch Description:
IBM Cloud Pak for Security是美国IBM公司的一款应用软件。一个开放的安全平台,可连接到您现有的数据源以产生更深刻的见解,并使您能够更快地采取自动化行动。
IBM Cloud Pak for Security 1.4.0.0、1.5.0.0、1.5.0.1、1.6.0.0和1.6.0.1版本存在恶意数据注入漏洞。该漏洞源于未能对用户输入的数据进行过滤,攻击者可利用该漏洞使用特制HTTP请求注入恶意数据。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
目前厂商已经发布了升级补丁以修复这个安全问题,请及时关注厂商主页:https://www.ibm.com/support/pages/node/6453115
Reference: https://nvd.nist.gov/vuln/detail/CVE-2020-4811
Impacted products
Name | ['IBM Cloud Pak for Security 1.4.0.0', 'IBM IBM Cloud Pak for Security 1.5.0.0', 'IBM IBM Cloud Pak for Security 1.5.0.1', 'IBM IBM Cloud Pak for Security 1.6.0.0', 'IBM IBM Cloud Pak for Security 1.6.0.1'] |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2020-4811", "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2020-4811" } }, "description": "IBM Cloud Pak for Security\u662f\u7f8e\u56fdIBM\u516c\u53f8\u7684\u4e00\u6b3e\u5e94\u7528\u8f6f\u4ef6\u3002\u4e00\u4e2a\u5f00\u653e\u7684\u5b89\u5168\u5e73\u53f0\uff0c\u53ef\u8fde\u63a5\u5230\u60a8\u73b0\u6709\u7684\u6570\u636e\u6e90\u4ee5\u4ea7\u751f\u66f4\u6df1\u523b\u7684\u89c1\u89e3\uff0c\u5e76\u4f7f\u60a8\u80fd\u591f\u66f4\u5feb\u5730\u91c7\u53d6\u81ea\u52a8\u5316\u884c\u52a8\u3002 \n\nIBM Cloud Pak for Security 1.4.0.0\u30011.5.0.0\u30011.5.0.1\u30011.6.0.0\u548c1.6.0.1\u7248\u672c\u5b58\u5728\u6076\u610f\u6570\u636e\u6ce8\u5165\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u672a\u80fd\u5bf9\u7528\u6237\u8f93\u5165\u7684\u6570\u636e\u8fdb\u884c\u8fc7\u6ee4\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u4f7f\u7528\u7279\u5236HTTP\u8bf7\u6c42\u6ce8\u5165\u6076\u610f\u6570\u636e\u3002", "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u5382\u5546\u4e3b\u9875\uff1ahttps://www.ibm.com/support/pages/node/6453115", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2021-36324", "openTime": "2021-05-21", "patchDescription": "IBM Cloud Pak for Security\u662f\u7f8e\u56fdIBM\u516c\u53f8\u7684\u4e00\u6b3e\u5e94\u7528\u8f6f\u4ef6\u3002\u4e00\u4e2a\u5f00\u653e\u7684\u5b89\u5168\u5e73\u53f0\uff0c\u53ef\u8fde\u63a5\u5230\u60a8\u73b0\u6709\u7684\u6570\u636e\u6e90\u4ee5\u4ea7\u751f\u66f4\u6df1\u523b\u7684\u89c1\u89e3\uff0c\u5e76\u4f7f\u60a8\u80fd\u591f\u66f4\u5feb\u5730\u91c7\u53d6\u81ea\u52a8\u5316\u884c\u52a8\u3002 \r\n\r\nIBM Cloud Pak for Security 1.4.0.0\u30011.5.0.0\u30011.5.0.1\u30011.6.0.0\u548c1.6.0.1\u7248\u672c\u5b58\u5728\u6076\u610f\u6570\u636e\u6ce8\u5165\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u672a\u80fd\u5bf9\u7528\u6237\u8f93\u5165\u7684\u6570\u636e\u8fdb\u884c\u8fc7\u6ee4\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u4f7f\u7528\u7279\u5236HTTP\u8bf7\u6c42\u6ce8\u5165\u6076\u610f\u6570\u636e\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "IBM Cloud Pak for Security\u6076\u610f\u6570\u636e\u6ce8\u5165\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": [ "IBM Cloud Pak for Security 1.4.0.0", "IBM IBM Cloud Pak for Security 1.5.0.0", "IBM IBM Cloud Pak for Security 1.5.0.1", "IBM IBM Cloud Pak for Security 1.6.0.0", "IBM IBM Cloud Pak for Security 1.6.0.1" ] }, "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2020-4811", "serverity": "\u4e2d", "submitTime": "2021-05-18", "title": "IBM Cloud Pak for Security\u6076\u610f\u6570\u636e\u6ce8\u5165\u6f0f\u6d1e" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…