CVE-2021-29872
Vulnerability from cvelistv5
Published
2022-01-18 16:50
Modified
2024-09-16 19:56
Severity ?
EPSS score ?
Summary
IBM Cloud Pak for Automation 21.0.1 and 21.0.2 - Business Automation Studio Component is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. By sending a specially crafted HTTP request, a remote attacker could exploit this vulnerability to inject HTTP HOST header, which will allow the attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. IBM X-Force ID: 206228.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@us.ibm.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/206228 | VDB Entry, Vendor Advisory | |
psirt@us.ibm.com | https://www.ibm.com/support/pages/node/6541294 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/206228 | VDB Entry, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.ibm.com/support/pages/node/6541294 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | IBM | Cloud Pak for Automation |
Version: 21.0.1 Version: 21.0.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T22:18:03.189Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ibm.com/support/pages/node/6541294" }, { "name": "ibm-icp4a-cve202129872-header-injection (206228)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/206228" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cloud Pak for Automation", "vendor": "IBM", "versions": [ { "status": "affected", "version": "21.0.1" }, { "status": "affected", "version": "21.0.2" } ] } ], "datePublic": "2022-01-17T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Cloud Pak for Automation 21.0.1 and 21.0.2 - Business Automation Studio Component is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. By sending a specially crafted HTTP request, a remote attacker could exploit this vulnerability to inject HTTP HOST header, which will allow the attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. IBM X-Force ID: 206228." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitCodeMaturity": "UNPROVEN", "integrityImpact": "LOW", "privilegesRequired": "LOW", "remediationLevel": "OFFICIAL_FIX", "reportConfidence": "CONFIRMED", "scope": "UNCHANGED", "temporalScore": 4.7, "temporalSeverity": "MEDIUM", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/C:L/AC:L/PR:L/I:L/UI:N/S:U/A:N/RC:C/E:U/RL:O", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Gain Access", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-18T16:50:10", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ibm.com/support/pages/node/6541294" }, { "name": "ibm-icp4a-cve202129872-header-injection (206228)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/206228" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2022-01-17T00:00:00", "ID": "CVE-2021-29872", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cloud Pak for Automation", "version": { "version_data": [ { "version_value": "21.0.1" }, { "version_value": "21.0.2" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Cloud Pak for Automation 21.0.1 and 21.0.2 - Business Automation Studio Component is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. By sending a specially crafted HTTP request, a remote attacker could exploit this vulnerability to inject HTTP HOST header, which will allow the attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. IBM X-Force ID: 206228." } ] }, "impact": { "cvssv3": { "BM": { "A": "N", "AC": "L", "AV": "N", "C": "L", "I": "L", "PR": "L", "S": "U", "UI": "N" }, "TM": { "E": "U", "RC": "C", "RL": "O" } } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Gain Access" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ibm.com/support/pages/node/6541294", "refsource": "CONFIRM", "title": "IBM Security Bulletin 6541294 (Cloud Pak for Automation)", "url": "https://www.ibm.com/support/pages/node/6541294" }, { "name": "ibm-icp4a-cve202129872-header-injection (206228)", "refsource": "XF", "title": "X-Force Vulnerability Report", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/206228" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2021-29872", "datePublished": "2022-01-18T16:50:10.770490Z", "dateReserved": "2021-03-31T00:00:00", "dateUpdated": "2024-09-16T19:56:13.182Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:cloud_pak_for_automation:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"21.0.2\", \"matchCriteriaId\": \"528C3F13-9C33-499B-9DD7-BD6355794569\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"37D1BB9B-3517-4AE3-A5E7-F57BFACB07BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.2:interim_fix001:*:*:*:*:*:*\", \"matchCriteriaId\": \"63CCBE13-44B9-4F56-AD72-D8323D7F9621\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.2:interim_fix002:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A99616F-DA95-48B5-B7BC-5186794CE72D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.2:interim_fix003:*:*:*:*:*:*\", \"matchCriteriaId\": \"F85EDEAC-F9EF-43CC-A978-85048FF19852\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.2:interim_fix004:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA8EDF0D-05B1-40FA-ADFE-D771AD6EBE40\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.2:interim_fix005:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A2FEB41-01B8-4C37-9F17-69255118E50A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.2:interim_fix006:*:*:*:*:*:*\", \"matchCriteriaId\": \"A188FDEC-5645-4964-AA64-8EADC78A977A\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:cloud_pak_for_automation:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"21.0.1\", \"matchCriteriaId\": \"DB8AD032-B625-4028-8DA4-D9B0DD602EF5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"18A895F5-B552-4BA2-869A-8125995C780E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.1:interim_fix001:*:*:*:*:*:*\", \"matchCriteriaId\": \"285F797E-CD76-47B5-8710-9EAF262D72B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.1:interim_fix002:*:*:*:*:*:*\", \"matchCriteriaId\": \"37DF98AA-87EE-473D-8A84-D66B707EC9FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.1:interim_fix003:*:*:*:*:*:*\", \"matchCriteriaId\": \"4BCCB354-A278-49BD-9162-673E29E59685\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.1:interim_fix004:*:*:*:*:*:*\", \"matchCriteriaId\": \"BB0A60F8-2250-402E-9087-3BE52B5CEC30\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.1:interim_fix005:*:*:*:*:*:*\", \"matchCriteriaId\": \"D52DC5A7-2345-45F9-A83A-2F1A8DAA9BAD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.1:interim_fix006:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC4C99DA-2CAF-452B-9FFF-20B90EC61319\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"IBM Cloud Pak for Automation 21.0.1 and 21.0.2 - Business Automation Studio Component is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. By sending a specially crafted HTTP request, a remote attacker could exploit this vulnerability to inject HTTP HOST header, which will allow the attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. IBM X-Force ID: 206228.\"}, {\"lang\": \"es\", \"value\": \"IBM Cloud Pak for Automation versiones 21.0.1 y 21.0.2 - Business Automation Studio Component es vulnerable a una inyecci\\u00f3n de encabezados HTTP, causada por una comprobaci\\u00f3n inapropiada de la entrada de los encabezados HOST. Mediante el env\\u00edo de una petici\\u00f3n HTTP especialmente dise\\u00f1ada, un atacante remoto podr\\u00eda explotar esta vulnerabilidad para inyectar el encabezado HTTP HOST, lo que permitir\\u00eda al atacante llevar a cabo varios ataques contra el sistema vulnerable, incluyendo de tipo cross-site scripting, envenenamiento de cach\\u00e9 o secuestro de sesi\\u00f3n. IBM X-Force ID: 206228\"}]", "id": "CVE-2021-29872", "lastModified": "2024-11-21T06:01:56.897", "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\", \"baseScore\": 5.4, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.3, \"impactScore\": 2.7}], \"cvssMetricV30\": [{\"source\": \"psirt@us.ibm.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N\", \"baseScore\": 5.4, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 2.5}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:S/C:N/I:P/A:N\", \"baseScore\": 3.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 6.8, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}", "published": "2022-01-18T17:15:08.353", "references": "[{\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/206228\", \"source\": \"psirt@us.ibm.com\", \"tags\": [\"VDB Entry\", \"Vendor Advisory\"]}, {\"url\": \"https://www.ibm.com/support/pages/node/6541294\", \"source\": \"psirt@us.ibm.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/206228\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"VDB Entry\", \"Vendor Advisory\"]}, {\"url\": \"https://www.ibm.com/support/pages/node/6541294\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}]", "sourceIdentifier": "psirt@us.ibm.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-116\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2021-29872\",\"sourceIdentifier\":\"psirt@us.ibm.com\",\"published\":\"2022-01-18T17:15:08.353\",\"lastModified\":\"2024-11-21T06:01:56.897\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"IBM Cloud Pak for Automation 21.0.1 and 21.0.2 - Business Automation Studio Component is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. By sending a specially crafted HTTP request, a remote attacker could exploit this vulnerability to inject HTTP HOST header, which will allow the attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. IBM X-Force ID: 206228.\"},{\"lang\":\"es\",\"value\":\"IBM Cloud Pak for Automation versiones 21.0.1 y 21.0.2 - Business Automation Studio Component es vulnerable a una inyecci\u00f3n de encabezados HTTP, causada por una comprobaci\u00f3n inapropiada de la entrada de los encabezados HOST. Mediante el env\u00edo de una petici\u00f3n HTTP especialmente dise\u00f1ada, un atacante remoto podr\u00eda explotar esta vulnerabilidad para inyectar el encabezado HTTP HOST, lo que permitir\u00eda al atacante llevar a cabo varios ataques contra el sistema vulnerable, incluyendo de tipo cross-site scripting, envenenamiento de cach\u00e9 o secuestro de sesi\u00f3n. IBM X-Force ID: 206228\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":5.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.3,\"impactScore\":2.7}],\"cvssMetricV30\":[{\"source\":\"psirt@us.ibm.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N\",\"baseScore\":5.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.5}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:S/C:N/I:P/A:N\",\"baseScore\":3.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":6.8,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-116\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:cloud_pak_for_automation:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"21.0.2\",\"matchCriteriaId\":\"528C3F13-9C33-499B-9DD7-BD6355794569\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37D1BB9B-3517-4AE3-A5E7-F57BFACB07BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.2:interim_fix001:*:*:*:*:*:*\",\"matchCriteriaId\":\"63CCBE13-44B9-4F56-AD72-D8323D7F9621\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.2:interim_fix002:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A99616F-DA95-48B5-B7BC-5186794CE72D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.2:interim_fix003:*:*:*:*:*:*\",\"matchCriteriaId\":\"F85EDEAC-F9EF-43CC-A978-85048FF19852\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.2:interim_fix004:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA8EDF0D-05B1-40FA-ADFE-D771AD6EBE40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.2:interim_fix005:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A2FEB41-01B8-4C37-9F17-69255118E50A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.2:interim_fix006:*:*:*:*:*:*\",\"matchCriteriaId\":\"A188FDEC-5645-4964-AA64-8EADC78A977A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:cloud_pak_for_automation:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"21.0.1\",\"matchCriteriaId\":\"DB8AD032-B625-4028-8DA4-D9B0DD602EF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18A895F5-B552-4BA2-869A-8125995C780E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.1:interim_fix001:*:*:*:*:*:*\",\"matchCriteriaId\":\"285F797E-CD76-47B5-8710-9EAF262D72B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.1:interim_fix002:*:*:*:*:*:*\",\"matchCriteriaId\":\"37DF98AA-87EE-473D-8A84-D66B707EC9FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.1:interim_fix003:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BCCB354-A278-49BD-9162-673E29E59685\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.1:interim_fix004:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB0A60F8-2250-402E-9087-3BE52B5CEC30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.1:interim_fix005:*:*:*:*:*:*\",\"matchCriteriaId\":\"D52DC5A7-2345-45F9-A83A-2F1A8DAA9BAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.1:interim_fix006:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC4C99DA-2CAF-452B-9FFF-20B90EC61319\"}]}]}],\"references\":[{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/206228\",\"source\":\"psirt@us.ibm.com\",\"tags\":[\"VDB Entry\",\"Vendor Advisory\"]},{\"url\":\"https://www.ibm.com/support/pages/node/6541294\",\"source\":\"psirt@us.ibm.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/206228\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"VDB Entry\",\"Vendor Advisory\"]},{\"url\":\"https://www.ibm.com/support/pages/node/6541294\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.