FKIE_CVE-2018-1434
Vulnerability from fkie_nvd - Published: 2018-05-17 21:29 - Updated: 2024-11-21 03:59
Severity ?
Summary
IBM SAN Volume Controller, IBM Storwize, IBM Spectrum Virtualize and IBM FlashSystem products ( 6.1, 6.2, 6.3, 6.4, 7.1, 7.2, 7.3, 7.4, 7.5, 7.6, 7.6.1, 7.7, 7.7.1, 7.8, 7.8.1, 8.1, and 8.1.1) are vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 139474.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ibm:storwize_v7000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D89606B4-1FED-4E6D-A9C4-743AD4370F13",
"versionEndExcluding": "7.5.0.14",
"versionStartIncluding": "6.1.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:storwize_v7000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3B321B55-5FFC-45E5-9321-9597E7A94A82",
"versionEndExcluding": "7.7.1.9",
"versionStartIncluding": "7.7.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:storwize_v7000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9D4ACA74-BAB6-47D1-BC50-8F07C4747462",
"versionEndExcluding": "7.8.1.6",
"versionStartIncluding": "7.8.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:storwize_v7000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4CD4279C-71D2-486B-90B8-10A1EC76A0F5",
"versionEndExcluding": "8.1.1.2",
"versionStartIncluding": "8.1.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:storwize_v7000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6489151B-4186-4053-85F0-46D2B1B1757C",
"versionEndExcluding": "8.1.2.1",
"versionStartIncluding": "8.1.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ibm:storwize_v7000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA2ED020-4C7B-4303-ABE6-74D46D127556",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ibm:storwize_v5000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DB9F3B31-D576-4409-9169-1E75817F9B8A",
"versionEndExcluding": "7.5.0.14",
"versionStartIncluding": "6.1.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:storwize_v5000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6A1CC99A-766D-424F-B326-B37730E3DA2C",
"versionEndExcluding": "7.7.1.9",
"versionStartIncluding": "7.7.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:storwize_v5000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AC5E991F-8158-4D5C-A386-758F66A6BF30",
"versionEndExcluding": "7.8.1.6",
"versionStartIncluding": "7.8.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:storwize_v5000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "21E4C68D-88AA-435C-847B-3240E1A01FFD",
"versionEndExcluding": "8.1.1.2",
"versionStartIncluding": "8.1.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:storwize_v5000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2B1B3F80-E9E5-42D5-8E90-3121C6D68CFC",
"versionEndExcluding": "8.1.2.1",
"versionStartIncluding": "8.1.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ibm:storwize_v5000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0B69C8D-32A4-449F-9BFC-F1587C7FA8BD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ibm:storwize_v3700_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EBC87F57-1CA7-407D-900F-1D4446F90622",
"versionEndExcluding": "7.5.0.14",
"versionStartIncluding": "6.1.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:storwize_v3700_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D60A6F64-CD2A-47E0-8042-ABB652CD91C8",
"versionEndExcluding": "7.7.1.9",
"versionStartIncluding": "7.7.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:storwize_v3700_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D5FBC1E8-ACE9-443C-8C9F-5699D49AFD0F",
"versionEndExcluding": "7.8.1.6",
"versionStartIncluding": "7.8.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:storwize_v3700_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4008901C-02BF-4E06-BAFD-478F4DD617C4",
"versionEndExcluding": "8.1.1.2",
"versionStartIncluding": "8.1.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:storwize_v3700_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A57126DD-E859-445F-BD4D-319E274E2C57",
"versionEndExcluding": "8.1.2.1",
"versionStartIncluding": "8.1.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ibm:storwize_v3700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49318A1D-49F6-4CA7-AE31-0EB4B3790CBB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ibm:storwize_v3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CEABCC87-2B83-40CA-B294-1DA05B0D3B73",
"versionEndExcluding": "7.5.0.14",
"versionStartIncluding": "6.1.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:storwize_v3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DD485024-AF76-4DCA-96EC-6B53B884FD7F",
"versionEndExcluding": "7.7.1.9",
"versionStartIncluding": "7.7.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:storwize_v3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3E6520AA-BE3E-4201-9801-6CCB44C32A44",
"versionEndExcluding": "7.8.1.6",
"versionStartIncluding": "7.8.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:storwize_v3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "334EAB80-5459-4B63-97E1-2037CEEA0F7D",
"versionEndExcluding": "8.1.1.2",
"versionStartIncluding": "8.1.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:storwize_v3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "69D74D0E-3687-47C7-A5A6-D9236DAA36B1",
"versionEndExcluding": "8.1.2.1",
"versionStartIncluding": "8.1.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ibm:storwize_v3500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7352FACE-C8D0-49A7-A2D7-B755599F0FB3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ibm:storwize_v9000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FC9AE767-4FD6-4B67-BDB7-0791DB021730",
"versionEndExcluding": "7.5.0.14",
"versionStartIncluding": "6.1.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:storwize_v9000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "94970CE9-7966-425F-A4EA-5A0CC6370ADF",
"versionEndExcluding": "7.7.1.9",
"versionStartIncluding": "7.7.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:storwize_v9000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7F85EE26-3790-444F-85E2-22DAEDDEA551",
"versionEndExcluding": "7.8.1.6",
"versionStartIncluding": "7.8.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:storwize_v9000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ACB73340-A00E-49F1-B35D-B0BA587E415B",
"versionEndExcluding": "8.1.1.2",
"versionStartIncluding": "8.1.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:storwize_v9000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "35C17D90-428F-4429-89B3-79CEB57BCB18",
"versionEndExcluding": "8.1.2.1",
"versionStartIncluding": "8.1.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ibm:storwize_v9000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE318865-39E2-4C29-AC4C-5FF8A915BF1E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ibm:san_volume_controller_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0628E9DA-BE99-40DE-9A5C-A4E6B85C3FCA",
"versionEndExcluding": "7.5.0.14",
"versionStartIncluding": "6.1.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:san_volume_controller_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "30B8D1B8-FBE8-4A9E-987C-CC71B8F73AE2",
"versionEndExcluding": "7.7.1.9",
"versionStartIncluding": "7.7.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:san_volume_controller_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5A76939A-1F90-4D2F-A746-2C4B2FBB438C",
"versionEndExcluding": "7.8.1.6",
"versionStartIncluding": "7.8.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:san_volume_controller_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7D054887-113F-484B-9C38-50C01F2FD5E7",
"versionEndExcluding": "8.1.1.2",
"versionStartIncluding": "8.1.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:san_volume_controller_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "14696A74-D805-49B0-BE42-4573E7EF64E2",
"versionEndExcluding": "8.1.2.1",
"versionStartIncluding": "8.1.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ibm:san_volume_controller:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5D84487-CEBA-48A0-9B15-A0300D992E3D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ibm:spectrum_virtualize:*:*:*:*:*:*:*:*",
"matchCriteriaId": "86AE1A09-5931-44C8-9484-0ABEE9E5B8D8",
"versionEndExcluding": "7.5.0.14",
"versionStartIncluding": "6.1.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:spectrum_virtualize:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6D078605-01D6-4BF4-8485-60322266E343",
"versionEndExcluding": "7.7.1.9",
"versionStartIncluding": "7.7.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:spectrum_virtualize:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D52F4979-E8D4-4718-BBBB-0576294C587D",
"versionEndExcluding": "7.8.1.6",
"versionStartIncluding": "7.8.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:spectrum_virtualize:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B0C01653-8CB3-491F-9223-C24B33A9A4EF",
"versionEndExcluding": "8.1.1.2",
"versionStartIncluding": "8.1.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:spectrum_virtualize:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CF2C8858-2FB2-434F-8952-A82F1D2EDA30",
"versionEndExcluding": "8.1.2.1",
"versionStartIncluding": "8.1.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ibm:spectrum_virtualize_for_public_cloud:*:*:*:*:*:*:*:*",
"matchCriteriaId": "49638631-FA8D-4B44-B243-58CCE54B4B6E",
"versionEndExcluding": "7.5.0.14",
"versionStartIncluding": "6.1.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:spectrum_virtualize_for_public_cloud:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B341B1B5-D8F0-4B21-A2A8-3CBF08878769",
"versionEndExcluding": "7.7.1.9",
"versionStartIncluding": "7.7.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:spectrum_virtualize_for_public_cloud:*:*:*:*:*:*:*:*",
"matchCriteriaId": "04D55F4A-3019-4D65-9C22-FE4F029A70E0",
"versionEndExcluding": "7.8.1.6",
"versionStartIncluding": "7.8.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:spectrum_virtualize_for_public_cloud:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ECF80390-D08F-4060-A267-5229F6CA1700",
"versionEndExcluding": "8.1.1.2",
"versionStartIncluding": "8.1.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:spectrum_virtualize_for_public_cloud:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E1D5EBAF-D22C-4340-B0FC-710797C23F95",
"versionEndExcluding": "8.1.2.1",
"versionStartIncluding": "8.1.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM SAN Volume Controller, IBM Storwize, IBM Spectrum Virtualize and IBM FlashSystem products ( 6.1, 6.2, 6.3, 6.4, 7.1, 7.2, 7.3, 7.4, 7.5, 7.6, 7.6.1, 7.7, 7.7.1, 7.8, 7.8.1, 8.1, and 8.1.1) are vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 139474."
},
{
"lang": "es",
"value": "Los productos IBM SAN Volume Controller, IBM Storwize, IBM Spectrum Virtualize e IBM FlashSystem ( 6.1, 6.2, 6.3, 6.4, 7.1, 7.2, 7.3, 7.4, 7.5, 7.6, 7.6.1, 7.7, 7.7.1, 7.8, 7.8.1, 8.1 y 8.1.1) son vulnerables a Cross-Site Request Forgery (CSRF), lo que podr\u00eda permitir que un atacante ejecute acciones maliciosas no autorizadas transmitidas de un usuario en el que conf\u00eda el sitio web. IBM X-Force ID: 139474."
}
],
"id": "CVE-2018-1434",
"lastModified": "2024-11-21T03:59:48.820",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-05-17T21:29:00.323",
"references": [
{
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1012263"
},
{
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1012282"
},
{
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1012283"
},
{
"source": "psirt@us.ibm.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/104349"
},
{
"source": "psirt@us.ibm.com",
"tags": [
"VDB Entry",
"Vendor Advisory"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/139474"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1012263"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1012282"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1012283"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/104349"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"VDB Entry",
"Vendor Advisory"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/139474"
}
],
"sourceIdentifier": "psirt@us.ibm.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-352"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…