Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CNVD-2018-13179
Vulnerability from cnvd - Published: 2018-07-13
VLAI Severity ?
Title
多款IBM产品跨站请求伪造漏洞(CNVD-2018-13179)
Description
IBM SAN Volume Controller(SVC)采用 IBM Spectrum Storage软件进行构建,是一种可靠的系统,有助于提高新的和现有存储基础架构的数据价值、安全性和易用性。IBM Storwize产品家族提供了具备常见功能以及管理和移动能力的全闪存及混合存储解决方案。IBM Spectrum Virtualize是一款纯软件的存储产品,支持软件定义存储管理和保护海量数据。IBM FlashSystem产品是将数据存储在闪存上的企业计算机数据存储系统。
IBM SAN Volume Controller、IBM Storwize、IBM Spectrum Virtualize及IBM FlashSystem产品存在跨站请求伪造漏洞。远程攻击者可利用该漏洞执行未授权的操作。
Severity
中
Patch Name
多款IBM产品跨站请求伪造漏洞(CNVD-2018-13179)的补丁
Patch Description
IBM SAN Volume Controller(SVC)采用 IBM Spectrum Storage软件进行构建,是一种可靠的系统,有助于提高新的和现有存储基础架构的数据价值、安全性和易用性。IBM Storwize产品家族提供了具备常见功能以及管理和移动能力的全闪存及混合存储解决方案。IBM Spectrum Virtualize是一款纯软件的存储产品,支持软件定义存储管理和保护海量数据。IBM FlashSystem产品是将数据存储在闪存上的企业计算机数据存储系统。
IBM SAN Volume Controller、IBM Storwize、IBM Spectrum Virtualize及IBM FlashSystem产品存在跨站请求伪造漏洞。远程攻击者可利用该漏洞执行未授权的操作。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
厂商已发布漏洞修复程序,请及时关注更新: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1012263 http://www-01.ibm.com/support/docview.wss?uid=ssg1S1012282 http://www-01.ibm.com/support/docview.wss?uid=ssg1S1012283
Reference
https://nvd.nist.gov/vuln/detail/CVE-2018-1434
Impacted products
| Name | ['IBM SAN Volume Controller >=7.5,<=8.1', 'IBM Storwize V7000 >=7.5,<=8.1', 'IBM Storwize V5000 >=7.5,<=8.1', 'IBM Storwize V3700 >=7.5,<=8.1', 'IBM Storwize V3500 >=7.5,<=8.1', 'IBM FlashSystem V9000 >=7.5,<=8.1', 'IBM Spectrum Virtualize Software >=7.5,<=8.1', 'IBM Spectrum Virtualize for Public Cloud >=7.5,<=8.1'] |
|---|
{
"bids": {
"bid": {
"bidNumber": "104349"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2018-1434"
}
},
"description": "IBM SAN Volume Controller\uff08SVC\uff09\u91c7\u7528 IBM Spectrum Storage\u8f6f\u4ef6\u8fdb\u884c\u6784\u5efa\uff0c\u662f\u4e00\u79cd\u53ef\u9760\u7684\u7cfb\u7edf\uff0c\u6709\u52a9\u4e8e\u63d0\u9ad8\u65b0\u7684\u548c\u73b0\u6709\u5b58\u50a8\u57fa\u7840\u67b6\u6784\u7684\u6570\u636e\u4ef7\u503c\u3001\u5b89\u5168\u6027\u548c\u6613\u7528\u6027\u3002IBM Storwize\u4ea7\u54c1\u5bb6\u65cf\u63d0\u4f9b\u4e86\u5177\u5907\u5e38\u89c1\u529f\u80fd\u4ee5\u53ca\u7ba1\u7406\u548c\u79fb\u52a8\u80fd\u529b\u7684\u5168\u95ea\u5b58\u53ca\u6df7\u5408\u5b58\u50a8\u89e3\u51b3\u65b9\u6848\u3002IBM Spectrum Virtualize\u662f\u4e00\u6b3e\u7eaf\u8f6f\u4ef6\u7684\u5b58\u50a8\u4ea7\u54c1\uff0c\u652f\u6301\u8f6f\u4ef6\u5b9a\u4e49\u5b58\u50a8\u7ba1\u7406\u548c\u4fdd\u62a4\u6d77\u91cf\u6570\u636e\u3002IBM FlashSystem\u4ea7\u54c1\u662f\u5c06\u6570\u636e\u5b58\u50a8\u5728\u95ea\u5b58\u4e0a\u7684\u4f01\u4e1a\u8ba1\u7b97\u673a\u6570\u636e\u5b58\u50a8\u7cfb\u7edf\u3002\r\n\r\nIBM SAN Volume Controller\u3001IBM Storwize\u3001IBM Spectrum Virtualize\u53caIBM FlashSystem\u4ea7\u54c1\u5b58\u5728\u8de8\u7ad9\u8bf7\u6c42\u4f2a\u9020\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u672a\u6388\u6743\u7684\u64cd\u4f5c\u3002",
"discovererName": "Jan Bee, and Sebastian Neuner from the Google Security Team",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttp://www-01.ibm.com/support/docview.wss?uid=ssg1S1012263\r\nhttp://www-01.ibm.com/support/docview.wss?uid=ssg1S1012282\r\nhttp://www-01.ibm.com/support/docview.wss?uid=ssg1S1012283",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2018-13179",
"openTime": "2018-07-13",
"patchDescription": "IBM SAN Volume Controller\uff08SVC\uff09\u91c7\u7528 IBM Spectrum Storage\u8f6f\u4ef6\u8fdb\u884c\u6784\u5efa\uff0c\u662f\u4e00\u79cd\u53ef\u9760\u7684\u7cfb\u7edf\uff0c\u6709\u52a9\u4e8e\u63d0\u9ad8\u65b0\u7684\u548c\u73b0\u6709\u5b58\u50a8\u57fa\u7840\u67b6\u6784\u7684\u6570\u636e\u4ef7\u503c\u3001\u5b89\u5168\u6027\u548c\u6613\u7528\u6027\u3002IBM Storwize\u4ea7\u54c1\u5bb6\u65cf\u63d0\u4f9b\u4e86\u5177\u5907\u5e38\u89c1\u529f\u80fd\u4ee5\u53ca\u7ba1\u7406\u548c\u79fb\u52a8\u80fd\u529b\u7684\u5168\u95ea\u5b58\u53ca\u6df7\u5408\u5b58\u50a8\u89e3\u51b3\u65b9\u6848\u3002IBM Spectrum Virtualize\u662f\u4e00\u6b3e\u7eaf\u8f6f\u4ef6\u7684\u5b58\u50a8\u4ea7\u54c1\uff0c\u652f\u6301\u8f6f\u4ef6\u5b9a\u4e49\u5b58\u50a8\u7ba1\u7406\u548c\u4fdd\u62a4\u6d77\u91cf\u6570\u636e\u3002IBM FlashSystem\u4ea7\u54c1\u662f\u5c06\u6570\u636e\u5b58\u50a8\u5728\u95ea\u5b58\u4e0a\u7684\u4f01\u4e1a\u8ba1\u7b97\u673a\u6570\u636e\u5b58\u50a8\u7cfb\u7edf\u3002\r\n\r\nIBM SAN Volume Controller\u3001IBM Storwize\u3001IBM Spectrum Virtualize\u53caIBM FlashSystem\u4ea7\u54c1\u5b58\u5728\u8de8\u7ad9\u8bf7\u6c42\u4f2a\u9020\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u672a\u6388\u6743\u7684\u64cd\u4f5c\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "\u591a\u6b3eIBM\u4ea7\u54c1\u8de8\u7ad9\u8bf7\u6c42\u4f2a\u9020\u6f0f\u6d1e\uff08CNVD-2018-13179\uff09\u7684\u8865\u4e01",
"products": {
"product": [
"IBM SAN Volume Controller \u003e=7.5\uff0c\u003c=8.1",
"IBM Storwize V7000 \u003e=7.5\uff0c\u003c=8.1",
"IBM Storwize V5000 \u003e=7.5\uff0c\u003c=8.1",
"IBM Storwize V3700 \u003e=7.5\uff0c\u003c=8.1",
"IBM Storwize V3500 \u003e=7.5\uff0c\u003c=8.1",
"IBM FlashSystem V9000 \u003e=7.5\uff0c\u003c=8.1",
"IBM Spectrum Virtualize Software \u003e=7.5\uff0c\u003c=8.1",
"IBM Spectrum Virtualize for Public Cloud \u003e=7.5\uff0c\u003c=8.1"
]
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2018-1434",
"serverity": "\u4e2d",
"submitTime": "2018-05-18",
"title": "\u591a\u6b3eIBM\u4ea7\u54c1\u8de8\u7ad9\u8bf7\u6c42\u4f2a\u9020\u6f0f\u6d1e\uff08CNVD-2018-13179\uff09"
}
CVE-2018-1434 (GCVE-0-2018-1434)
Vulnerability from cvelistv5 – Published: 2018-05-17 21:00 – Updated: 2024-09-17 02:11
VLAI?
EPSS
Summary
IBM SAN Volume Controller, IBM Storwize, IBM Spectrum Virtualize and IBM FlashSystem products ( 6.1, 6.2, 6.3, 6.4, 7.1, 7.2, 7.3, 7.4, 7.5, 7.6, 7.6.1, 7.7, 7.7.1, 7.8, 7.8.1, 8.1, and 8.1.1) are vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 139474.
Severity ?
No CVSS data available.
CWE
- Gain Access
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| IBM | FlashSystem V9000 |
Affected:
7.5
Affected: 7.6 Affected: 7.6.1 Affected: 7.7 Affected: 7.7.1 Affected: 7.8 Affected: 7.8.1 Affected: 8.1 Affected: 6.1 Affected: 6.2 Affected: 6.3 Affected: 6.4 Affected: 7.1 Affected: 7.2 Affected: 7.3 Affected: 7.4 Affected: 8.1.1 |
|||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T03:59:39.064Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1012282"
},
{
"name": "ibm-storwize-cve20181434-csrf(139474)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/139474"
},
{
"name": "104349",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/104349"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1012263"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1012283"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "FlashSystem V9000",
"vendor": "IBM",
"versions": [
{
"status": "affected",
"version": "7.5"
},
{
"status": "affected",
"version": "7.6"
},
{
"status": "affected",
"version": "7.6.1"
},
{
"status": "affected",
"version": "7.7"
},
{
"status": "affected",
"version": "7.7.1"
},
{
"status": "affected",
"version": "7.8"
},
{
"status": "affected",
"version": "7.8.1"
},
{
"status": "affected",
"version": "8.1"
},
{
"status": "affected",
"version": "6.1"
},
{
"status": "affected",
"version": "6.2"
},
{
"status": "affected",
"version": "6.3"
},
{
"status": "affected",
"version": "6.4"
},
{
"status": "affected",
"version": "7.1"
},
{
"status": "affected",
"version": "7.2"
},
{
"status": "affected",
"version": "7.3"
},
{
"status": "affected",
"version": "7.4"
},
{
"status": "affected",
"version": "8.1.1"
}
]
},
{
"product": "Storwize V3700",
"vendor": "IBM",
"versions": [
{
"status": "affected",
"version": "7.1"
},
{
"status": "affected",
"version": "6.4"
},
{
"status": "affected",
"version": "7.5"
},
{
"status": "affected",
"version": "7.6"
},
{
"status": "affected",
"version": "7.6.1"
},
{
"status": "affected",
"version": "7.7"
},
{
"status": "affected",
"version": "7.7.1"
},
{
"status": "affected",
"version": "7.8"
},
{
"status": "affected",
"version": "7.8.1"
},
{
"status": "affected",
"version": "8.1"
},
{
"status": "affected",
"version": "6.1"
},
{
"status": "affected",
"version": "6.2"
},
{
"status": "affected",
"version": "6.3"
},
{
"status": "affected",
"version": "7.2"
},
{
"status": "affected",
"version": "7.3"
},
{
"status": "affected",
"version": "7.4"
},
{
"status": "affected",
"version": "8.1.1"
}
]
},
{
"product": "Storwize V5000",
"vendor": "IBM",
"versions": [
{
"status": "affected",
"version": "7.1"
},
{
"status": "affected",
"version": "7.5"
},
{
"status": "affected",
"version": "7.6"
},
{
"status": "affected",
"version": "7.6.1"
},
{
"status": "affected",
"version": "7.7"
},
{
"status": "affected",
"version": "7.7.1"
},
{
"status": "affected",
"version": "7.8"
},
{
"status": "affected",
"version": "7.8.1"
},
{
"status": "affected",
"version": "8.1"
},
{
"status": "affected",
"version": "6.1"
},
{
"status": "affected",
"version": "6.2"
},
{
"status": "affected",
"version": "6.3"
},
{
"status": "affected",
"version": "6.4"
},
{
"status": "affected",
"version": "7.2"
},
{
"status": "affected",
"version": "7.3"
},
{
"status": "affected",
"version": "7.4"
},
{
"status": "affected",
"version": "8.1.1"
}
]
},
{
"product": "Spectrum Virtualize Software",
"vendor": "IBM",
"versions": [
{
"status": "affected",
"version": "7.5"
},
{
"status": "affected",
"version": "7.6"
},
{
"status": "affected",
"version": "7.6.1"
},
{
"status": "affected",
"version": "7.7"
},
{
"status": "affected",
"version": "7.7.1"
},
{
"status": "affected",
"version": "7.8"
},
{
"status": "affected",
"version": "7.8.1"
},
{
"status": "affected",
"version": "8.1"
},
{
"status": "affected",
"version": "6.1"
},
{
"status": "affected",
"version": "6.2"
},
{
"status": "affected",
"version": "6.3"
},
{
"status": "affected",
"version": "6.4"
},
{
"status": "affected",
"version": "7.1"
},
{
"status": "affected",
"version": "7.2"
},
{
"status": "affected",
"version": "7.3"
},
{
"status": "affected",
"version": "7.4"
},
{
"status": "affected",
"version": "8.1.1"
}
]
},
{
"product": "SAN Volume Controller",
"vendor": "IBM",
"versions": [
{
"status": "affected",
"version": "6.1"
},
{
"status": "affected",
"version": "6.2"
},
{
"status": "affected",
"version": "6.3"
},
{
"status": "affected",
"version": "6.4"
},
{
"status": "affected",
"version": "7.1"
},
{
"status": "affected",
"version": "7.5"
},
{
"status": "affected",
"version": "7.6"
},
{
"status": "affected",
"version": "7.6.1"
},
{
"status": "affected",
"version": "7.7"
},
{
"status": "affected",
"version": "7.7.1"
},
{
"status": "affected",
"version": "7.8"
},
{
"status": "affected",
"version": "7.8.1"
},
{
"status": "affected",
"version": "8.1"
}
]
},
{
"product": "Spectrum Virtualize for Public Cloud",
"vendor": "IBM",
"versions": [
{
"status": "affected",
"version": "7.5"
},
{
"status": "affected",
"version": "7.6"
},
{
"status": "affected",
"version": "7.6.1"
},
{
"status": "affected",
"version": "7.7"
},
{
"status": "affected",
"version": "7.7.1"
},
{
"status": "affected",
"version": "7.8"
},
{
"status": "affected",
"version": "7.8.1"
},
{
"status": "affected",
"version": "8.1"
},
{
"status": "affected",
"version": "6.1"
},
{
"status": "affected",
"version": "6.2"
},
{
"status": "affected",
"version": "6.3"
},
{
"status": "affected",
"version": "6.4"
},
{
"status": "affected",
"version": "7.1"
},
{
"status": "affected",
"version": "7.2"
},
{
"status": "affected",
"version": "7.3"
},
{
"status": "affected",
"version": "7.4"
},
{
"status": "affected",
"version": "8.1.1"
}
]
},
{
"product": "Storwize V7000 (2076)",
"vendor": "IBM",
"versions": [
{
"status": "affected",
"version": "6.1"
},
{
"status": "affected",
"version": "6.2"
},
{
"status": "affected",
"version": "6.3"
},
{
"status": "affected",
"version": "6.4"
},
{
"status": "affected",
"version": "7.1"
},
{
"status": "affected",
"version": "7.2"
},
{
"status": "affected",
"version": "7.3"
},
{
"status": "affected",
"version": "7.4"
},
{
"status": "affected",
"version": "1.1"
},
{
"status": "affected",
"version": "7.5"
},
{
"status": "affected",
"version": "7.6"
},
{
"status": "affected",
"version": "7.6.1"
},
{
"status": "affected",
"version": "7.7"
},
{
"status": "affected",
"version": "7.7.1"
},
{
"status": "affected",
"version": "7.8"
},
{
"status": "affected",
"version": "7.8.1"
},
{
"status": "affected",
"version": "8.1"
},
{
"status": "affected",
"version": "8.1.1"
}
]
},
{
"product": "Storwize V3500",
"vendor": "IBM",
"versions": [
{
"status": "affected",
"version": "6.4"
},
{
"status": "affected",
"version": "7.1"
},
{
"status": "affected",
"version": "7.5"
},
{
"status": "affected",
"version": "7.6"
},
{
"status": "affected",
"version": "7.6.1"
},
{
"status": "affected",
"version": "7.7"
},
{
"status": "affected",
"version": "7.7.1"
},
{
"status": "affected",
"version": "7.8"
},
{
"status": "affected",
"version": "7.8.1"
},
{
"status": "affected",
"version": "8.1"
},
{
"status": "affected",
"version": "6.1"
},
{
"status": "affected",
"version": "6.2"
},
{
"status": "affected",
"version": "6.3"
},
{
"status": "affected",
"version": "7.2"
},
{
"status": "affected",
"version": "7.3"
},
{
"status": "affected",
"version": "7.4"
},
{
"status": "affected",
"version": "8.1.1"
}
]
}
],
"datePublic": "2018-05-14T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "IBM SAN Volume Controller, IBM Storwize, IBM Spectrum Virtualize and IBM FlashSystem products ( 6.1, 6.2, 6.3, 6.4, 7.1, 7.2, 7.3, 7.4, 7.5, 7.6, 7.6.1, 7.7, 7.7.1, 7.8, 7.8.1, 8.1, and 8.1.1) are vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 139474."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Gain Access",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-06-04T09:57:01",
"orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"shortName": "ibm"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1012282"
},
{
"name": "ibm-storwize-cve20181434-csrf(139474)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/139474"
},
{
"name": "104349",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/104349"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1012263"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1012283"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@us.ibm.com",
"DATE_PUBLIC": "2018-05-14T00:00:00",
"ID": "CVE-2018-1434",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "FlashSystem V9000",
"version": {
"version_data": [
{
"version_value": "7.5"
},
{
"version_value": "7.6"
},
{
"version_value": "7.6.1"
},
{
"version_value": "7.7"
},
{
"version_value": "7.7.1"
},
{
"version_value": "7.8"
},
{
"version_value": "7.8.1"
},
{
"version_value": "8.1"
},
{
"version_value": "6.1"
},
{
"version_value": "6.2"
},
{
"version_value": "6.3"
},
{
"version_value": "6.4"
},
{
"version_value": "7.1"
},
{
"version_value": "7.2"
},
{
"version_value": "7.3"
},
{
"version_value": "7.4"
},
{
"version_value": "8.1.1"
}
]
}
},
{
"product_name": "Storwize V3700",
"version": {
"version_data": [
{
"version_value": "7.1"
},
{
"version_value": "6.4"
},
{
"version_value": "7.5"
},
{
"version_value": "7.6"
},
{
"version_value": "7.6.1"
},
{
"version_value": "7.7"
},
{
"version_value": "7.7.1"
},
{
"version_value": "7.8"
},
{
"version_value": "7.8.1"
},
{
"version_value": "8.1"
},
{
"version_value": "6.1"
},
{
"version_value": "6.2"
},
{
"version_value": "6.3"
},
{
"version_value": "7.2"
},
{
"version_value": "7.3"
},
{
"version_value": "7.4"
},
{
"version_value": "8.1.1"
}
]
}
},
{
"product_name": "Storwize V5000",
"version": {
"version_data": [
{
"version_value": "7.1"
},
{
"version_value": "7.5"
},
{
"version_value": "7.6"
},
{
"version_value": "7.6.1"
},
{
"version_value": "7.7"
},
{
"version_value": "7.7.1"
},
{
"version_value": "7.8"
},
{
"version_value": "7.8.1"
},
{
"version_value": "8.1"
},
{
"version_value": "6.1"
},
{
"version_value": "6.2"
},
{
"version_value": "6.3"
},
{
"version_value": "6.4"
},
{
"version_value": "7.2"
},
{
"version_value": "7.3"
},
{
"version_value": "7.4"
},
{
"version_value": "8.1.1"
}
]
}
},
{
"product_name": "Spectrum Virtualize Software",
"version": {
"version_data": [
{
"version_value": "7.5"
},
{
"version_value": "7.6"
},
{
"version_value": "7.6.1"
},
{
"version_value": "7.7"
},
{
"version_value": "7.7.1"
},
{
"version_value": "7.8"
},
{
"version_value": "7.8.1"
},
{
"version_value": "8.1"
},
{
"version_value": "6.1"
},
{
"version_value": "6.2"
},
{
"version_value": "6.3"
},
{
"version_value": "6.4"
},
{
"version_value": "7.1"
},
{
"version_value": "7.2"
},
{
"version_value": "7.3"
},
{
"version_value": "7.4"
},
{
"version_value": "8.1.1"
}
]
}
},
{
"product_name": "SAN Volume Controller",
"version": {
"version_data": [
{
"version_value": "6.1"
},
{
"version_value": "6.2"
},
{
"version_value": "6.3"
},
{
"version_value": "6.4"
},
{
"version_value": "7.1"
},
{
"version_value": "7.5"
},
{
"version_value": "7.6"
},
{
"version_value": "7.6.1"
},
{
"version_value": "7.7"
},
{
"version_value": "7.7.1"
},
{
"version_value": "7.8"
},
{
"version_value": "7.8.1"
},
{
"version_value": "8.1"
}
]
}
},
{
"product_name": "Spectrum Virtualize for Public Cloud",
"version": {
"version_data": [
{
"version_value": "7.5"
},
{
"version_value": "7.6"
},
{
"version_value": "7.6.1"
},
{
"version_value": "7.7"
},
{
"version_value": "7.7.1"
},
{
"version_value": "7.8"
},
{
"version_value": "7.8.1"
},
{
"version_value": "8.1"
},
{
"version_value": "6.1"
},
{
"version_value": "6.2"
},
{
"version_value": "6.3"
},
{
"version_value": "6.4"
},
{
"version_value": "7.1"
},
{
"version_value": "7.2"
},
{
"version_value": "7.3"
},
{
"version_value": "7.4"
},
{
"version_value": "8.1.1"
}
]
}
},
{
"product_name": "Storwize V7000 (2076)",
"version": {
"version_data": [
{
"version_value": "6.1"
},
{
"version_value": "6.2"
},
{
"version_value": "6.3"
},
{
"version_value": "6.4"
},
{
"version_value": "7.1"
},
{
"version_value": "7.2"
},
{
"version_value": "7.3"
},
{
"version_value": "7.4"
},
{
"version_value": "1.1"
},
{
"version_value": "7.5"
},
{
"version_value": "7.6"
},
{
"version_value": "7.6.1"
},
{
"version_value": "7.7"
},
{
"version_value": "7.7.1"
},
{
"version_value": "7.8"
},
{
"version_value": "7.8.1"
},
{
"version_value": "8.1"
},
{
"version_value": "8.1.1"
}
]
}
},
{
"product_name": "Storwize V3500",
"version": {
"version_data": [
{
"version_value": "6.4"
},
{
"version_value": "7.1"
},
{
"version_value": "7.5"
},
{
"version_value": "7.6"
},
{
"version_value": "7.6.1"
},
{
"version_value": "7.7"
},
{
"version_value": "7.7.1"
},
{
"version_value": "7.8"
},
{
"version_value": "7.8.1"
},
{
"version_value": "8.1"
},
{
"version_value": "6.1"
},
{
"version_value": "6.2"
},
{
"version_value": "6.3"
},
{
"version_value": "7.2"
},
{
"version_value": "7.3"
},
{
"version_value": "7.4"
},
{
"version_value": "8.1.1"
}
]
}
}
]
},
"vendor_name": "IBM"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "IBM SAN Volume Controller, IBM Storwize, IBM Spectrum Virtualize and IBM FlashSystem products ( 6.1, 6.2, 6.3, 6.4, 7.1, 7.2, 7.3, 7.4, 7.5, 7.6, 7.6.1, 7.7, 7.7.1, 7.8, 7.8.1, 8.1, and 8.1.1) are vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 139474."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Gain Access"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.ibm.com/support/docview.wss?uid=ssg1S1012282",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1012282"
},
{
"name": "ibm-storwize-cve20181434-csrf(139474)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/139474"
},
{
"name": "104349",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104349"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=ssg1S1012263",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1012263"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=ssg1S1012283",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1012283"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"assignerShortName": "ibm",
"cveId": "CVE-2018-1434",
"datePublished": "2018-05-17T21:00:00Z",
"dateReserved": "2017-12-13T00:00:00",
"dateUpdated": "2024-09-17T02:11:40.577Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…