cvelist/2019/4xxx/CVE-2019-4728.json

102 lines
3.5 KiB
JSON
Raw Normal View History

2019-01-03 15:04:29 -05:00
{
2021-01-05 16:01:56 +00:00
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://www.ibm.com/support/pages/node/6396172",
"title": "IBM Security Bulletin 6396172 (Sterling B2B Integrator)",
"url": "https://www.ibm.com/support/pages/node/6396172"
},
{
"title": "X-Force Vulnerability Report",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/172452",
"refsource": "XF",
"name": "ibm-sterling-cve20194728-code-exec (172452)"
}
]
},
"CVE_data_meta": {
"ID": "CVE-2019-4728",
"ASSIGNER": "psirt@us.ibm.com",
"STATE": "PUBLIC",
"DATE_PUBLIC": "2021-01-04T00:00:00"
},
"data_version": "4.0",
"problemtype": {
"problemtype_data": [
2019-03-17 22:24:22 +00:00
{
2021-01-05 16:01:56 +00:00
"description": [
{
"value": "Gain Access",
"lang": "eng"
}
]
2019-03-17 22:24:22 +00:00
}
2021-01-05 16:01:56 +00:00
]
},
"data_format": "MITRE",
"description": {
"description_data": [
{
"value": "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5_2, 6.0.0.0 through 6.0.3.2, and 6.1.0.0 could allow a remote attacker to execute arbitrary code on the system, caused by the deserialization of untrusted data. By sending specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code with SYSTEM privileges. IBM X-Force ID: 172452.",
"lang": "eng"
}
]
},
"impact": {
"cvssv3": {
"TM": {
"RL": "O",
"RC": "C",
"E": "U"
},
"BM": {
"AC": "L",
"S": "U",
"SCORE": "8.800",
"I": "H",
"AV": "N",
"PR": "L",
"C": "H",
"UI": "N",
"A": "H"
}
}
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "IBM",
"product": {
"product_data": [
{
"version": {
"version_data": [
{
"version_value": "6.0.0.0"
},
{
"version_value": "5.2.0.0"
},
{
"version_value": "6.0.3.2"
},
{
"version_value": "6.1.0.0"
},
{
"version_value": "5.2.6.5_2"
}
]
},
"product_name": "Sterling B2B Integrator"
}
]
}
}
]
}
},
"data_type": "CVE"
}