cve-2019-4149
Vulnerability from cvelistv5
Published
2019-09-05 14:50
Modified
2024-09-16 22:25
Severity ?
EPSS score ?
Summary
IBM Business Automation Workflow V18.0.0.0 through V18.0.0.2 and IBM Business Process Manager V8.6.0.0 through V8.6.0.0 Cumulative Fix 2018.03, V8.5.7.0 through V8.5.7.0 Cumulative Fix 2017.06, and V8.5.6.0 through V8.5.6.0 CF2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 158415.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@us.ibm.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/158415 | VDB Entry, Vendor Advisory | |
psirt@us.ibm.com | https://www.ibm.com/support/docview.wss?uid=ibm10885104 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/158415 | VDB Entry, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.ibm.com/support/docview.wss?uid=ibm10885104 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | IBM | Business Automation Workflow |
Version: 18.0.0.0 Version: 18.0.0.2 |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:26:28.032Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ibm.com/support/docview.wss?uid=ibm10885104" }, { "name": "ibm-baw-cve20194149-xss (158415)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/158415" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Business Automation Workflow", "vendor": "IBM", "versions": [ { "status": "affected", "version": "18.0.0.0" }, { "status": "affected", "version": "18.0.0.2" } ] }, { "product": "Business Process Manager", "vendor": "IBM", "versions": [ { "status": "affected", "version": "8.6.0.0" }, { "status": "affected", "version": "8.5.6.0" }, { "status": "affected", "version": "8.5.6.0CF2" }, { "status": "affected", "version": "8.5.7.0" }, { "status": "affected", "version": "8.5.7.0CF2017.06" }, { "status": "affected", "version": "8.6.0.0CF2018.03" } ] } ], "datePublic": "2019-08-30T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Business Automation Workflow V18.0.0.0 through V18.0.0.2 and IBM Business Process Manager V8.6.0.0 through V8.6.0.0 Cumulative Fix 2018.03, V8.5.7.0 through V8.5.7.0 Cumulative Fix 2017.06, and V8.5.6.0 through V8.5.6.0 CF2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 158415." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitCodeMaturity": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "remediationLevel": "OFFICIAL_FIX", "reportConfidence": "CONFIRMED", "scope": "CHANGED", "temporalScore": 5.2, "temporalSeverity": "MEDIUM", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AC:L/UI:R/AV:N/I:L/PR:L/A:N/S:C/C:L/RL:O/E:H/RC:C", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-Site Scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-09-05T14:50:15", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ibm.com/support/docview.wss?uid=ibm10885104" }, { "name": "ibm-baw-cve20194149-xss (158415)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/158415" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2019-08-30T00:00:00", "ID": "CVE-2019-4149", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Business Automation Workflow", "version": { "version_data": [ { "version_value": "18.0.0.0" }, { "version_value": "18.0.0.2" } ] } }, { "product_name": "Business Process Manager", "version": { "version_data": [ { "version_value": "8.6.0.0" }, { "version_value": "8.5.6.0" }, { "version_value": "8.5.6.0CF2" }, { "version_value": "8.5.7.0" }, { "version_value": "8.5.7.0CF2017.06" }, { "version_value": "8.6.0.0CF2018.03" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Business Automation Workflow V18.0.0.0 through V18.0.0.2 and IBM Business Process Manager V8.6.0.0 through V8.6.0.0 Cumulative Fix 2018.03, V8.5.7.0 through V8.5.7.0 Cumulative Fix 2017.06, and V8.5.6.0 through V8.5.6.0 CF2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 158415." } ] }, "impact": { "cvssv3": { "BM": { "A": "N", "AC": "L", "AV": "N", "C": "L", "I": "L", "PR": "L", "S": "C", "UI": "R" }, "TM": { "E": "H", "RC": "C", "RL": "O" } } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-Site Scripting" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ibm.com/support/docview.wss?uid=ibm10885104", "refsource": "CONFIRM", "title": "IBM Security Bulletin 885104 (Business Automation Workflow)", "url": "https://www.ibm.com/support/docview.wss?uid=ibm10885104" }, { "name": "ibm-baw-cve20194149-xss (158415)", "refsource": "XF", "title": "X-Force Vulnerability Report", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/158415" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2019-4149", "datePublished": "2019-09-05T14:50:15.508801Z", "dateReserved": "2019-01-03T00:00:00", "dateUpdated": "2024-09-16T22:25:21.255Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"18.0.0.0\", \"versionEndIncluding\": \"18.0.0.2\", \"matchCriteriaId\": \"1B8A1C8F-793A-4F66-8217-70E16C5C832B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_process_manager:8.5.6.0:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE77FBBD-0033-4DDC-BBFC-8927C96A2DE6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_process_manager:8.5.6.0:cf1:*:*:*:*:*:*\", \"matchCriteriaId\": \"6131DC1F-CBA6-4025-B5A5-98307274FA33\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_process_manager:8.5.6.0:cf2:*:*:*:*:*:*\", \"matchCriteriaId\": \"439A4F14-76E6-4A21-A23C-D3DA243585A9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_process_manager:8.5.7.0:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"1874008E-86F5-4A15-B4D1-14AB666166ED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_process_manager:8.5.7.0:cf201706:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2B1150A-E780-42BF-8D9E-77258C1D869A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_process_manager:8.6.0.0:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"04D332A0-BEA8-4E22-A37C-1AC76B36ACDB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_process_manager:8.6.0.0:cf201712:*:*:*:*:*:*\", \"matchCriteriaId\": \"F7B13D9D-E6BC-4621-A3F2-57F501DC97B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_process_manager:8.6.0.0:cf201803:*:*:*:*:*:*\", \"matchCriteriaId\": \"71A849EF-53B1-4402-85BE-D75E4765AEAB\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"IBM Business Automation Workflow V18.0.0.0 through V18.0.0.2 and IBM Business Process Manager V8.6.0.0 through V8.6.0.0 Cumulative Fix 2018.03, V8.5.7.0 through V8.5.7.0 Cumulative Fix 2017.06, and V8.5.6.0 through V8.5.6.0 CF2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 158415.\"}, {\"lang\": \"es\", \"value\": \"IBM Business Automation Workflow versi\\u00f3n 18.0.0.0 hasta la versi\\u00f3n 18.0.0.2 e IBM Business Process Manager versi\\u00f3n 8.6.0.0 hasta la versi\\u00f3n 8.6.0.0 Cumulative Fix 2018.03, versi\\u00f3n 8.5.7.0 hasta la versi\\u00f3n 8.5.7.0 Cumulative Fix 2017.06, y versi\\u00f3n 8.5.6.0 hasta la versi\\u00f3n 8.5.6.0 CF2 es vulnerable a Cross-Site Scripting (XSS). Esta vulnerabilidad permite a los usuarios incrustar c\\u00f3digo JavaScript arbitrario en la interfaz de usuario web, lo que altera la funcionalidad prevista que puede conducir a la divulgaci\\u00f3n de credenciales dentro de una sesi\\u00f3n de confianza. ID de IBM X-Force: 158415.\"}]", "id": "CVE-2019-4149", "lastModified": "2024-11-21T04:43:14.430", "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\", \"baseScore\": 5.4, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.3, \"impactScore\": 2.7}], \"cvssMetricV30\": [{\"source\": \"psirt@us.ibm.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\", \"baseScore\": 5.4, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.3, \"impactScore\": 2.7}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:S/C:N/I:P/A:N\", \"baseScore\": 3.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 6.8, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}", "published": "2019-09-05T15:15:12.907", "references": "[{\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/158415\", \"source\": \"psirt@us.ibm.com\", \"tags\": [\"VDB Entry\", \"Vendor Advisory\"]}, {\"url\": \"https://www.ibm.com/support/docview.wss?uid=ibm10885104\", \"source\": \"psirt@us.ibm.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/158415\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"VDB Entry\", \"Vendor Advisory\"]}, {\"url\": \"https://www.ibm.com/support/docview.wss?uid=ibm10885104\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]", "sourceIdentifier": "psirt@us.ibm.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2019-4149\",\"sourceIdentifier\":\"psirt@us.ibm.com\",\"published\":\"2019-09-05T15:15:12.907\",\"lastModified\":\"2024-11-21T04:43:14.430\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"IBM Business Automation Workflow V18.0.0.0 through V18.0.0.2 and IBM Business Process Manager V8.6.0.0 through V8.6.0.0 Cumulative Fix 2018.03, V8.5.7.0 through V8.5.7.0 Cumulative Fix 2017.06, and V8.5.6.0 through V8.5.6.0 CF2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 158415.\"},{\"lang\":\"es\",\"value\":\"IBM Business Automation Workflow versi\u00f3n 18.0.0.0 hasta la versi\u00f3n 18.0.0.2 e IBM Business Process Manager versi\u00f3n 8.6.0.0 hasta la versi\u00f3n 8.6.0.0 Cumulative Fix 2018.03, versi\u00f3n 8.5.7.0 hasta la versi\u00f3n 8.5.7.0 Cumulative Fix 2017.06, y versi\u00f3n 8.5.6.0 hasta la versi\u00f3n 8.5.6.0 CF2 es vulnerable a Cross-Site Scripting (XSS). Esta vulnerabilidad permite a los usuarios incrustar c\u00f3digo JavaScript arbitrario en la interfaz de usuario web, lo que altera la funcionalidad prevista que puede conducir a la divulgaci\u00f3n de credenciales dentro de una sesi\u00f3n de confianza. ID de IBM X-Force: 158415.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":5.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.3,\"impactScore\":2.7}],\"cvssMetricV30\":[{\"source\":\"psirt@us.ibm.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":5.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.3,\"impactScore\":2.7}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:S/C:N/I:P/A:N\",\"baseScore\":3.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":6.8,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"18.0.0.0\",\"versionEndIncluding\":\"18.0.0.2\",\"matchCriteriaId\":\"1B8A1C8F-793A-4F66-8217-70E16C5C832B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_process_manager:8.5.6.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE77FBBD-0033-4DDC-BBFC-8927C96A2DE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_process_manager:8.5.6.0:cf1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6131DC1F-CBA6-4025-B5A5-98307274FA33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_process_manager:8.5.6.0:cf2:*:*:*:*:*:*\",\"matchCriteriaId\":\"439A4F14-76E6-4A21-A23C-D3DA243585A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_process_manager:8.5.7.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"1874008E-86F5-4A15-B4D1-14AB666166ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_process_manager:8.5.7.0:cf201706:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2B1150A-E780-42BF-8D9E-77258C1D869A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_process_manager:8.6.0.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"04D332A0-BEA8-4E22-A37C-1AC76B36ACDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_process_manager:8.6.0.0:cf201712:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7B13D9D-E6BC-4621-A3F2-57F501DC97B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_process_manager:8.6.0.0:cf201803:*:*:*:*:*:*\",\"matchCriteriaId\":\"71A849EF-53B1-4402-85BE-D75E4765AEAB\"}]}]}],\"references\":[{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/158415\",\"source\":\"psirt@us.ibm.com\",\"tags\":[\"VDB Entry\",\"Vendor Advisory\"]},{\"url\":\"https://www.ibm.com/support/docview.wss?uid=ibm10885104\",\"source\":\"psirt@us.ibm.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/158415\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"VDB Entry\",\"Vendor Advisory\"]},{\"url\":\"https://www.ibm.com/support/docview.wss?uid=ibm10885104\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.