CVE-2024-38321 (GCVE-0-2024-38321)
Vulnerability from cvelistv5 – Published: 2024-08-03 13:34 – Updated: 2024-08-03 18:49
VLAI?
Summary
IBM Business Automation Workflow 22.0.2, 23.0.1, 23.0.2, and 24.0.0 stores potentially sensitive information in log files under certain situations that could be read by an authenticated user. IBM X-Force ID: 284868.
Severity ?
5.3 (Medium)
CWE
- CWE-532 - Insertion of Sensitive Information into Log File
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| IBM | Business Automation Workflow |
Affected:
22.0.2, 23.0.1, 23.0.2, 24.0.0
cpe:2.3:a:ibm:business_automation_workflow:22.0.2:*:*:*:-:*:*:* cpe:2.3:a:ibm:business_automation_workflow:23.0.1:*:*:*:-:*:*:* cpe:2.3:a:ibm:business_automation_workflow:23.0.2:*:*:*:-:*:*:* cpe:2.3:a:ibm:business_automation_workflow:24.0.0:*:*:*:-:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-38321",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-03T18:49:18.410755Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-03T18:49:24.893Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:ibm:business_automation_workflow:22.0.2:*:*:*:-:*:*:*",
"cpe:2.3:a:ibm:business_automation_workflow:23.0.1:*:*:*:-:*:*:*",
"cpe:2.3:a:ibm:business_automation_workflow:23.0.2:*:*:*:-:*:*:*",
"cpe:2.3:a:ibm:business_automation_workflow:24.0.0:*:*:*:-:*:*:*"
],
"defaultStatus": "unaffected",
"product": "Business Automation Workflow",
"vendor": "IBM",
"versions": [
{
"status": "affected",
"version": "22.0.2, 23.0.1, 23.0.2, 24.0.0"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "IBM Business Automation Workflow 22.0.2, 23.0.1, 23.0.2, and 24.0.0 stores potentially sensitive information in log files under certain situations that could be read by an authenticated user. IBM X-Force ID: 284868."
}
],
"value": "IBM Business Automation Workflow 22.0.2, 23.0.1, 23.0.2, and 24.0.0 stores potentially sensitive information in log files under certain situations that could be read by an authenticated user. IBM X-Force ID: 284868."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-532",
"description": "CWE-532 Insertion of Sensitive Information into Log File",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-03T13:34:16.845Z",
"orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"shortName": "ibm"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.ibm.com/support/pages/node/7162334"
},
{
"tags": [
"vdb-entry"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/294868"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "IBM Business Automation Workflow information disclosure",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"assignerShortName": "ibm",
"cveId": "CVE-2024-38321",
"datePublished": "2024-08-03T13:34:16.845Z",
"dateReserved": "2024-06-13T21:43:46.667Z",
"dateUpdated": "2024-08-03T18:49:24.893Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_automation_workflow:20.0.0.1:*:*:*:containers:*:*:*\", \"matchCriteriaId\": \"AEB1C9C9-69C0-41CA-8FE8-9E2C142DC112\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_automation_workflow:20.0.0.2:*:*:*:containers:*:*:*\", \"matchCriteriaId\": \"B9C41C12-BD6B-4E49-9BA4-288524FF55C8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_automation_workflow:21.0.2:*:*:*:containers:*:*:*\", \"matchCriteriaId\": \"9FDDD905-95EA-4DCC-B359-7E6DAEFC537D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:-:*:*:containers:*:*:*\", \"matchCriteriaId\": \"12725407-1B9F-43B7-8D66-F0E3B0181830\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if002:*:*:containers:*:*:*\", \"matchCriteriaId\": \"00F5E82D-712A-4AB2-B0B2-BF03507D17D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if005:*:*:containers:*:*:*\", \"matchCriteriaId\": \"0063E78F-2978-43F6-884D-B375E1111E87\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if006:*:*:containers:*:*:*\", \"matchCriteriaId\": \"CF6317BE-98DF-4A46-9F5B-326177D6AD68\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if007:*:*:containers:*:*:*\", \"matchCriteriaId\": \"72A22C4B-AAF2-4A84-AF39-C1C396031D98\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if008:*:*:containers:*:*:*\", \"matchCriteriaId\": \"39015A02-D36E-4CC9-A5E3-877DFD923ACD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if009:*:*:containers:*:*:*\", \"matchCriteriaId\": \"19586E74-8802-4C09-A240-D698EE30C570\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if010:*:*:containers:*:*:*\", \"matchCriteriaId\": \"4B06D109-E327-4A2A-9FC9-A5F454022C0D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if011:*:*:containers:*:*:*\", \"matchCriteriaId\": \"E67BEF93-133E-4507-B938-79D943AB82CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if012:*:*:containers:*:*:*\", \"matchCriteriaId\": \"84689E35-3C11-44D2-B719-0F47CC7DE6B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if013:*:*:containers:*:*:*\", \"matchCriteriaId\": \"05248E0A-BE7C-4AA1-80B8-5397382D742E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if014:*:*:containers:*:*:*\", \"matchCriteriaId\": \"0852419C-62F1-49BA-BD99-96700D33ED64\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if015:*:*:containers:*:*:*\", \"matchCriteriaId\": \"628B7F15-103F-4B84-90ED-EBFAD633BCE8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if016:*:*:containers:*:*:*\", \"matchCriteriaId\": \"91E22A7B-18F4-461C-9986-0CECBAB879F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if017:*:*:containers:*:*:*\", \"matchCriteriaId\": \"4FE832E4-BE4B-4923-A98D-3B127758C103\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if028:*:*:containers:*:*:*\", \"matchCriteriaId\": \"EE7E0724-C7FB-4436-A702-EC2102205175\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if029:*:*:containers:*:*:*\", \"matchCriteriaId\": \"40505E62-F229-45B5-8D22-30487471477C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if030:*:*:containers:*:*:*\", \"matchCriteriaId\": \"D8E150F5-F27C-471C-A911-C2CC07E31EBD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if031:*:*:containers:*:*:*\", \"matchCriteriaId\": \"3F8FA6E0-01CF-458A-8AD3-3388BBA4FE5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if032:*:*:containers:*:*:*\", \"matchCriteriaId\": \"2CAF9596-964B-4E58-BB9D-07138F4566F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if033:*:*:containers:*:*:*\", \"matchCriteriaId\": \"08853431-59B4-4730-88E3-812DF7B6691B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if034:*:*:containers:*:*:*\", \"matchCriteriaId\": \"1BDB3D3C-1964-42F1-8035-2B4F2752E535\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_automation_workflow:22.0.1:*:*:*:containers:*:*:*\", \"matchCriteriaId\": \"A157A0AD-B1AB-4FBB-AD00-348ADAE52173\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_automation_workflow:22.0.2:*:*:*:containers:*:*:*\", \"matchCriteriaId\": \"F2F5CF83-2F00-476D-BA79-5BD0AF71D929\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_automation_workflow:23.0.1:*:*:*:containers:*:*:*\", \"matchCriteriaId\": \"AC67163F-742E-46BC-BF63-75F15F8D2DCF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_automation_workflow:23.0.2:*:*:*:containers:*:*:*\", \"matchCriteriaId\": \"A99644F1-3E98-4156-B155-7FA642EA7BBC\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:traditional:*:*:*\", \"versionStartIncluding\": \"19.0.0.1\", \"versionEndIncluding\": \"19.0.0.3\", \"matchCriteriaId\": \"DB90C98C-7A38-4B9B-878C-028DD872D19C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:traditional:*:*:*\", \"versionStartIncluding\": \"20.0.0.1\", \"versionEndIncluding\": \"20.0.0.2\", \"matchCriteriaId\": \"1FD8E8F7-6B5F-4A21-90AF-483A8DFE4CFA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:traditional:*:*:*\", \"versionStartIncluding\": \"21.0.1\", \"versionEndIncluding\": \"21.0.3.0\", \"matchCriteriaId\": \"07308147-9441-4231-9BC0-231C3181F255\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:traditional:*:*:*\", \"versionStartIncluding\": \"22.0.1\", \"versionEndIncluding\": \"22.0.2\", \"matchCriteriaId\": \"5CA224F7-AF29-4F8C-BD70-E9C0A7A2B366\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:traditional:*:*:*\", \"versionStartIncluding\": \"23.0.1\", \"versionEndIncluding\": \"23.0.2\", \"matchCriteriaId\": \"A510FD89-9F92-4514-A706-52719EDC59E0\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:enterprise_service_bus:*:*:*\", \"versionStartIncluding\": \"23.0.1\", \"versionEndIncluding\": \"23.0.2\", \"matchCriteriaId\": \"981B50AE-8B79-4E39-87AA-34DFA93B607A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:business_automation_workflow:22.0.2:*:*:*:enterprise_service_bus:*:*:*\", \"matchCriteriaId\": \"3E9B8E36-CA86-459C-A0CF-F00F179119FD\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"IBM Business Automation Workflow 22.0.2, 23.0.1, 23.0.2, and 24.0.0 stores potentially sensitive information in log files under certain situations that could be read by an authenticated user. IBM X-Force ID: 284868.\"}, {\"lang\": \"es\", \"value\": \"IBM Business Automation Workflow 22.0.2, 23.0.1, 23.0.2 y 24.0.0 almacena informaci\\u00f3n potencialmente confidencial en archivos de registro en determinadas situaciones que un usuario autenticado podr\\u00eda leer. ID de IBM X-Force: 284868.\"}]",
"id": "CVE-2024-38321",
"lastModified": "2024-09-06T14:50:53.583",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"psirt@us.ibm.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.6, \"impactScore\": 3.6}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 3.6}]}",
"published": "2024-08-03T14:15:48.013",
"references": "[{\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/294868\", \"source\": \"psirt@us.ibm.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"https://www.ibm.com/support/pages/node/7162334\", \"source\": \"psirt@us.ibm.com\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "psirt@us.ibm.com",
"vulnStatus": "Analyzed",
"weaknesses": "[{\"source\": \"psirt@us.ibm.com\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-532\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-38321\",\"sourceIdentifier\":\"psirt@us.ibm.com\",\"published\":\"2024-08-03T14:15:48.013\",\"lastModified\":\"2024-09-06T14:50:53.583\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"IBM Business Automation Workflow 22.0.2, 23.0.1, 23.0.2, and 24.0.0 stores potentially sensitive information in log files under certain situations that could be read by an authenticated user. IBM X-Force ID: 284868.\"},{\"lang\":\"es\",\"value\":\"IBM Business Automation Workflow 22.0.2, 23.0.1, 23.0.2 y 24.0.0 almacena informaci\u00f3n potencialmente confidencial en archivos de registro en determinadas situaciones que un usuario autenticado podr\u00eda leer. ID de IBM X-Force: 284868.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@us.ibm.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.6,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"psirt@us.ibm.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-532\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:20.0.0.1:*:*:*:containers:*:*:*\",\"matchCriteriaId\":\"AEB1C9C9-69C0-41CA-8FE8-9E2C142DC112\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:20.0.0.2:*:*:*:containers:*:*:*\",\"matchCriteriaId\":\"B9C41C12-BD6B-4E49-9BA4-288524FF55C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.2:*:*:*:containers:*:*:*\",\"matchCriteriaId\":\"9FDDD905-95EA-4DCC-B359-7E6DAEFC537D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:-:*:*:containers:*:*:*\",\"matchCriteriaId\":\"12725407-1B9F-43B7-8D66-F0E3B0181830\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if002:*:*:containers:*:*:*\",\"matchCriteriaId\":\"00F5E82D-712A-4AB2-B0B2-BF03507D17D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if005:*:*:containers:*:*:*\",\"matchCriteriaId\":\"0063E78F-2978-43F6-884D-B375E1111E87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if006:*:*:containers:*:*:*\",\"matchCriteriaId\":\"CF6317BE-98DF-4A46-9F5B-326177D6AD68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if007:*:*:containers:*:*:*\",\"matchCriteriaId\":\"72A22C4B-AAF2-4A84-AF39-C1C396031D98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if008:*:*:containers:*:*:*\",\"matchCriteriaId\":\"39015A02-D36E-4CC9-A5E3-877DFD923ACD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if009:*:*:containers:*:*:*\",\"matchCriteriaId\":\"19586E74-8802-4C09-A240-D698EE30C570\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if010:*:*:containers:*:*:*\",\"matchCriteriaId\":\"4B06D109-E327-4A2A-9FC9-A5F454022C0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if011:*:*:containers:*:*:*\",\"matchCriteriaId\":\"E67BEF93-133E-4507-B938-79D943AB82CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if012:*:*:containers:*:*:*\",\"matchCriteriaId\":\"84689E35-3C11-44D2-B719-0F47CC7DE6B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if013:*:*:containers:*:*:*\",\"matchCriteriaId\":\"05248E0A-BE7C-4AA1-80B8-5397382D742E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if014:*:*:containers:*:*:*\",\"matchCriteriaId\":\"0852419C-62F1-49BA-BD99-96700D33ED64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if015:*:*:containers:*:*:*\",\"matchCriteriaId\":\"628B7F15-103F-4B84-90ED-EBFAD633BCE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if016:*:*:containers:*:*:*\",\"matchCriteriaId\":\"91E22A7B-18F4-461C-9986-0CECBAB879F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if017:*:*:containers:*:*:*\",\"matchCriteriaId\":\"4FE832E4-BE4B-4923-A98D-3B127758C103\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if028:*:*:containers:*:*:*\",\"matchCriteriaId\":\"EE7E0724-C7FB-4436-A702-EC2102205175\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if029:*:*:containers:*:*:*\",\"matchCriteriaId\":\"40505E62-F229-45B5-8D22-30487471477C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if030:*:*:containers:*:*:*\",\"matchCriteriaId\":\"D8E150F5-F27C-471C-A911-C2CC07E31EBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if031:*:*:containers:*:*:*\",\"matchCriteriaId\":\"3F8FA6E0-01CF-458A-8AD3-3388BBA4FE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if032:*:*:containers:*:*:*\",\"matchCriteriaId\":\"2CAF9596-964B-4E58-BB9D-07138F4566F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if033:*:*:containers:*:*:*\",\"matchCriteriaId\":\"08853431-59B4-4730-88E3-812DF7B6691B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if034:*:*:containers:*:*:*\",\"matchCriteriaId\":\"1BDB3D3C-1964-42F1-8035-2B4F2752E535\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:22.0.1:*:*:*:containers:*:*:*\",\"matchCriteriaId\":\"A157A0AD-B1AB-4FBB-AD00-348ADAE52173\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:22.0.2:*:*:*:containers:*:*:*\",\"matchCriteriaId\":\"F2F5CF83-2F00-476D-BA79-5BD0AF71D929\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:23.0.1:*:*:*:containers:*:*:*\",\"matchCriteriaId\":\"AC67163F-742E-46BC-BF63-75F15F8D2DCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:23.0.2:*:*:*:containers:*:*:*\",\"matchCriteriaId\":\"A99644F1-3E98-4156-B155-7FA642EA7BBC\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:traditional:*:*:*\",\"versionStartIncluding\":\"19.0.0.1\",\"versionEndIncluding\":\"19.0.0.3\",\"matchCriteriaId\":\"DB90C98C-7A38-4B9B-878C-028DD872D19C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:traditional:*:*:*\",\"versionStartIncluding\":\"20.0.0.1\",\"versionEndIncluding\":\"20.0.0.2\",\"matchCriteriaId\":\"1FD8E8F7-6B5F-4A21-90AF-483A8DFE4CFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:traditional:*:*:*\",\"versionStartIncluding\":\"21.0.1\",\"versionEndIncluding\":\"21.0.3.0\",\"matchCriteriaId\":\"07308147-9441-4231-9BC0-231C3181F255\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:traditional:*:*:*\",\"versionStartIncluding\":\"22.0.1\",\"versionEndIncluding\":\"22.0.2\",\"matchCriteriaId\":\"5CA224F7-AF29-4F8C-BD70-E9C0A7A2B366\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:traditional:*:*:*\",\"versionStartIncluding\":\"23.0.1\",\"versionEndIncluding\":\"23.0.2\",\"matchCriteriaId\":\"A510FD89-9F92-4514-A706-52719EDC59E0\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:enterprise_service_bus:*:*:*\",\"versionStartIncluding\":\"23.0.1\",\"versionEndIncluding\":\"23.0.2\",\"matchCriteriaId\":\"981B50AE-8B79-4E39-87AA-34DFA93B607A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:22.0.2:*:*:*:enterprise_service_bus:*:*:*\",\"matchCriteriaId\":\"3E9B8E36-CA86-459C-A0CF-F00F179119FD\"}]}]}],\"references\":[{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/294868\",\"source\":\"psirt@us.ibm.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://www.ibm.com/support/pages/node/7162334\",\"source\":\"psirt@us.ibm.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-38321\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-08-03T18:49:18.410755Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-08-03T18:49:22.213Z\"}}], \"cna\": {\"title\": \"IBM Business Automation Workflow information disclosure\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:ibm:business_automation_workflow:22.0.2:*:*:*:-:*:*:*\", \"cpe:2.3:a:ibm:business_automation_workflow:23.0.1:*:*:*:-:*:*:*\", \"cpe:2.3:a:ibm:business_automation_workflow:23.0.2:*:*:*:-:*:*:*\", \"cpe:2.3:a:ibm:business_automation_workflow:24.0.0:*:*:*:-:*:*:*\"], \"vendor\": \"IBM\", \"product\": \"Business Automation Workflow\", \"versions\": [{\"status\": \"affected\", \"version\": \"22.0.2, 23.0.1, 23.0.2, 24.0.0\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://www.ibm.com/support/pages/node/7162334\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/294868\", \"tags\": [\"vdb-entry\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"IBM Business Automation Workflow 22.0.2, 23.0.1, 23.0.2, and 24.0.0 stores potentially sensitive information in log files under certain situations that could be read by an authenticated user. IBM X-Force ID: 284868.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"IBM Business Automation Workflow 22.0.2, 23.0.1, 23.0.2, and 24.0.0 stores potentially sensitive information in log files under certain situations that could be read by an authenticated user. IBM X-Force ID: 284868.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-532\", \"description\": \"CWE-532 Insertion of Sensitive Information into Log File\"}]}], \"providerMetadata\": {\"orgId\": \"9a959283-ebb5-44b6-b705-dcc2bbced522\", \"shortName\": \"ibm\", \"dateUpdated\": \"2024-08-03T13:34:16.845Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-38321\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-03T18:49:24.893Z\", \"dateReserved\": \"2024-06-13T21:43:46.667Z\", \"assignerOrgId\": \"9a959283-ebb5-44b6-b705-dcc2bbced522\", \"datePublished\": \"2024-08-03T13:34:16.845Z\", \"assignerShortName\": \"ibm\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…