Vulnerabilites related to IBM - Transformation Extender Advanced
var-201605-0373
Vulnerability from variot
IBM Multi-Enterprise Integration Gateway 1.0 through 1.0.0.1 and B2B Advanced Communications 1.0.0.2 through 1.0.0.4 do not require HTTPS, which might allow remote attackers to obtain sensitive information by sniffing the network. IBMB2BAdvanced Communications is a communications gateway product. Multiple IBM Products is prone to a local information-disclosure vulnerability. There is an information disclosure vulnerability in , which is caused by the fact that the program is not configured with HTTPS
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201605-0373", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "b2b advanced communications", "scope": "eq", "trust": 1.9, "vendor": "ibm", "version": "1.0.0.3" }, { "model": "b2b advanced communications", "scope": "eq", "trust": 1.9, "vendor": "ibm", "version": "1.0.0.2" }, { "model": "b2b advanced communications", "scope": "eq", "trust": 1.6, "vendor": "ibm", "version": "1.0" }, { "model": "multi-enterprise integration gateway", "scope": "eq", "trust": 1.6, "vendor": "ibm", "version": "1.0.0" }, { "model": "b2b advanced communications", "scope": "eq", "trust": 1.6, "vendor": "ibm", "version": "1.0.0.1" }, { "model": "b2b advanced communications", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "1.0.0.2 to 1.0.0.4" }, { "model": "multi-enterprise integration gateway", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "1.0.0.1 for up to 1.0" }, { "model": "b2b advanced communications", "scope": "gte", "trust": 0.6, "vendor": "ibm", "version": "1.0.0.2\u003c=1.0.0.4" }, { "model": "transformation extender advanced", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.0.1" }, { "model": "transformation extender advanced", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "sterling b2b integrator", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.6" }, { "model": "sterling b2b integrator", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.5.0" }, { "model": "standards processing engine", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1.2" }, { "model": "multi-enterprise integration gateway", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.0.1" }, { "model": "multi-enterprise integration gateway", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0" }, { "model": "b2b advanced communications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.0.4" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-02871" }, { "db": "BID", "id": "89859" }, { "db": "JVNDB", "id": "JVNDB-2016-002774" }, { "db": "NVD", "id": "CVE-2016-0341" }, { "db": "CNNVD", "id": "CNNVD-201605-130" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:ibm:b2b_advanced_communications:1.0.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ibm:b2b_advanced_communications:1.0.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ibm:b2b_advanced_communications:1.0.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ibm:b2b_advanced_communications:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:ibm:multi-enterprise_integration_gateway:1.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-0341" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "IBM", "sources": [ { "db": "BID", "id": "89859" } ], "trust": 0.3 }, "cve": "CVE-2016-0341", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2016-0341", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2016-02871", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-87851", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2016-0341", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-0341", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2016-02871", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201605-130", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-87851", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-02871" }, { "db": "VULHUB", "id": "VHN-87851" }, { "db": "JVNDB", "id": "JVNDB-2016-002774" }, { "db": "NVD", "id": "CVE-2016-0341" }, { "db": "CNNVD", "id": "CNNVD-201605-130" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "IBM Multi-Enterprise Integration Gateway 1.0 through 1.0.0.1 and B2B Advanced Communications 1.0.0.2 through 1.0.0.4 do not require HTTPS, which might allow remote attackers to obtain sensitive information by sniffing the network. IBMB2BAdvanced Communications is a communications gateway product. Multiple IBM Products is prone to a local information-disclosure vulnerability. There is an information disclosure vulnerability in , which is caused by the fact that the program is not configured with HTTPS", "sources": [ { "db": "NVD", "id": "CVE-2016-0341" }, { "db": "JVNDB", "id": "JVNDB-2016-002774" }, { "db": "CNVD", "id": "CNVD-2016-02871" }, { "db": "BID", "id": "89859" }, { "db": "VULHUB", "id": "VHN-87851" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-0341", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2016-002774", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201605-130", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-02871", "trust": 0.6 }, { "db": "BID", "id": "89859", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-87851", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-02871" }, { "db": "VULHUB", "id": "VHN-87851" }, { "db": "BID", "id": "89859" }, { "db": "JVNDB", "id": "JVNDB-2016-002774" }, { "db": "NVD", "id": "CVE-2016-0341" }, { "db": "CNNVD", "id": "CNNVD-201605-130" } ] }, "id": "VAR-201605-0373", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-02871" }, { "db": "VULHUB", "id": "VHN-87851" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-02871" } ] }, "last_update_date": "2023-12-18T12:37:48.803000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "1981462", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21981462" }, { "title": "Patch for IBMB2BAdvanced Communications Information Disclosure Vulnerability (CNVD-2016-02871)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/75410" }, { "title": "IBM B2B Advanced Communications Repair measures for information disclosure vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=61453" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-02871" }, { "db": "JVNDB", "id": "JVNDB-2016-002774" }, { "db": "CNNVD", "id": "CNNVD-201605-130" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-87851" }, { "db": "JVNDB", "id": "JVNDB-2016-002774" }, { "db": "NVD", "id": "CVE-2016-0341" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21981462" }, { "trust": 1.7, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1it14835" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-0341" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-0341" }, { "trust": 0.3, "url": "http://www.ibm.com/" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21985111" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21987644" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-02871" }, { "db": "VULHUB", "id": "VHN-87851" }, { "db": "BID", "id": "89859" }, { "db": "JVNDB", "id": "JVNDB-2016-002774" }, { "db": "NVD", "id": "CVE-2016-0341" }, { "db": "CNNVD", "id": "CNNVD-201605-130" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-02871" }, { "db": "VULHUB", "id": "VHN-87851" }, { "db": "BID", "id": "89859" }, { "db": "JVNDB", "id": "JVNDB-2016-002774" }, { "db": "NVD", "id": "CVE-2016-0341" }, { "db": "CNNVD", "id": "CNNVD-201605-130" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-05-10T00:00:00", "db": "CNVD", "id": "CNVD-2016-02871" }, { "date": "2016-05-15T00:00:00", "db": "VULHUB", "id": "VHN-87851" }, { "date": "2016-05-02T00:00:00", "db": "BID", "id": "89859" }, { "date": "2016-05-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-002774" }, { "date": "2016-05-15T01:59:00.160000", "db": "NVD", "id": "CVE-2016-0341" }, { "date": "2016-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-201605-130" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-05-10T00:00:00", "db": "CNVD", "id": "CNVD-2016-02871" }, { "date": "2016-05-19T00:00:00", "db": "VULHUB", "id": "VHN-87851" }, { "date": "2016-08-11T13:00:00", "db": "BID", "id": "89859" }, { "date": "2016-05-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-002774" }, { "date": "2016-05-19T16:03:02.167000", "db": "NVD", "id": "CVE-2016-0341" }, { "date": "2016-05-16T00:00:00", "db": "CNNVD", "id": "CNNVD-201605-130" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201605-130" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "IBM Multi-Enterprise Integration Gateway and B2B Advanced Communications Vulnerability in which important information is obtained", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-002774" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201605-130" } ], "trust": 0.6 } }
cve-2017-1758
Vulnerability from cvelistv5
Published
2018-02-21 21:00
Modified
2024-09-16 17:03
Severity ?
EPSS score ?
Summary
IBM Financial Transaction Manager for ACH Services for Multi-Platform (IBM Control Center 6.0 and 6.1, IBM Financial Transaction Manager 3.0.2, 3.0.3, 3.0.4, and 3.1.0, IBM Transformation Extender Advanced 9.0) is vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 135859.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/135859 | x_refsource_MISC | |
http://www.securityfocus.com/bid/103130 | vdb-entry, x_refsource_BID | |
http://www.ibm.com/support/docview.wss?uid=swg22013432 | x_refsource_CONFIRM | |
http://www.ibm.com/support/docview.wss?uid=swg22012828 | x_refsource_CONFIRM | |
http://www.ibm.com/support/docview.wss?uid=swg22013375 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | IBM | Control Center |
Version: 6.0 Version: 6.1 Version: 6.1.1 |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T13:39:32.241Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/135859" }, { "name": "103130", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103130" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22013432" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22012828" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22013375" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Control Center", "vendor": "IBM", "versions": [ { "status": "affected", "version": "6.0" }, { "status": "affected", "version": "6.1" }, { "status": "affected", "version": "6.1.1" } ] }, { "product": "Financial Transaction Manager", "vendor": "IBM", "versions": [ { "status": "affected", "version": "3.0.2" }, { "status": "affected", "version": "3.0.2.0" }, { "status": "affected", "version": "3.0.2.1" }, { "status": "affected", "version": "3.0.4" }, { "status": "affected", "version": "3.0.4.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.0.0" }, { "status": "affected", "version": "3.0.3" }, { "status": "affected", "version": "3.0.3.0" } ] }, { "product": "Transformation Extender Advanced", "vendor": "IBM", "versions": [ { "status": "affected", "version": "9.0" } ] } ], "datePublic": "2018-02-19T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Financial Transaction Manager for ACH Services for Multi-Platform (IBM Control Center 6.0 and 6.1, IBM Financial Transaction Manager 3.0.2, 3.0.3, 3.0.4, and 3.1.0, IBM Transformation Extender Advanced 9.0) is vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 135859." } ], "problemTypes": [ { "descriptions": [ { "description": "Obtain Information", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-24T10:57:01", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/135859" }, { "name": "103130", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103130" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22013432" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22012828" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22013375" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2018-02-19T00:00:00", "ID": "CVE-2017-1758", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Control Center", "version": { "version_data": [ { "version_value": "6.0" }, { "version_value": "6.1" }, { "version_value": "6.1.1" } ] } }, { "product_name": "Financial Transaction Manager", "version": { "version_data": [ { "version_value": "3.0.2" }, { "version_value": "3.0.2.0" }, { "version_value": "3.0.2.1" }, { "version_value": "3.0.4" }, { "version_value": "3.0.4.0" }, { "version_value": "3.1.0" }, { "version_value": "3.1.0.0" }, { "version_value": "3.0.3" }, { "version_value": "3.0.3.0" } ] } }, { "product_name": "Transformation Extender Advanced", "version": { "version_data": [ { "version_value": "9.0" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Financial Transaction Manager for ACH Services for Multi-Platform (IBM Control Center 6.0 and 6.1, IBM Financial Transaction Manager 3.0.2, 3.0.3, 3.0.4, and 3.1.0, IBM Transformation Extender Advanced 9.0) is vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 135859." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Obtain Information" } ] } ] }, "references": { "reference_data": [ { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/135859", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/135859" }, { "name": "103130", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103130" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg22013432", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg22013432" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg22012828", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg22012828" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg22013375", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg22013375" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2017-1758", "datePublished": "2018-02-21T21:00:00Z", "dateReserved": "2016-11-30T00:00:00", "dateUpdated": "2024-09-16T17:03:15.367Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-29883
Vulnerability from cvelistv5
Published
2021-10-21 16:40
Modified
2024-09-16 23:36
Severity ?
EPSS score ?
Summary
IBM Standards Processing Engine (IBM Transformation Extender Advanced 9.0 and 10.0) does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 207090.
References
▼ | URL | Tags |
---|---|---|
https://www.ibm.com/support/pages/node/6507077 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/207090 | vdb-entry, x_refsource_XF |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
IBM | Transformation Extender Advanced |
Version: 9.0 Version: 10.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T22:18:03.280Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ibm.com/support/pages/node/6507077" }, { "name": "ibm-spe-cve202129883-info-disc (207090)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/207090" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Transformation Extender Advanced", "vendor": "IBM", "versions": [ { "status": "affected", "version": "9.0" }, { "status": "affected", "version": "10.0" } ] } ], "datePublic": "2021-10-20T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Standards Processing Engine (IBM Transformation Extender Advanced 9.0 and 10.0) does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 207090." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitCodeMaturity": "UNPROVEN", "integrityImpact": "NONE", "privilegesRequired": "NONE", "remediationLevel": "OFFICIAL_FIX", "reportConfidence": "CONFIRMED", "scope": "UNCHANGED", "temporalScore": 3.8, "temporalSeverity": "LOW", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AC:L/UI:R/S:U/C:L/PR:N/I:N/AV:N/A:N/RL:O/E:U/RC:C", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Obtain Information", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-21T16:40:15", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ibm.com/support/pages/node/6507077" }, { "name": "ibm-spe-cve202129883-info-disc (207090)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/207090" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2021-10-20T00:00:00", "ID": "CVE-2021-29883", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Transformation Extender Advanced", "version": { "version_data": [ { "version_value": "9.0" }, { "version_value": "10.0" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Standards Processing Engine (IBM Transformation Extender Advanced 9.0 and 10.0) does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 207090." } ] }, "impact": { "cvssv3": { "BM": { "A": "N", "AC": "L", "AV": "N", "C": "L", "I": "N", "PR": "N", "S": "U", "UI": "R" }, "TM": { "E": "U", "RC": "C", "RL": "O" } } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Obtain Information" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ibm.com/support/pages/node/6507077", "refsource": "CONFIRM", "title": "IBM Security Bulletin 6507077 (Transformation Extender Advanced)", "url": "https://www.ibm.com/support/pages/node/6507077" }, { "name": "ibm-spe-cve202129883-info-disc (207090)", "refsource": "XF", "title": "X-Force Vulnerability Report", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/207090" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2021-29883", "datePublished": "2021-10-21T16:40:15.255893Z", "dateReserved": "2021-03-31T00:00:00", "dateUpdated": "2024-09-16T23:36:41.143Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }