2019-01-03 15:04:29 -05:00
{
2019-06-26 15:01:07 +00:00
"impact" : {
"cvssv3" : {
"BM" : {
"A" : "L" ,
"S" : "U" ,
"PR" : "L" ,
"AV" : "N" ,
"C" : "L" ,
"UI" : "N" ,
"SCORE" : "6.300" ,
"I" : "L" ,
"AC" : "L"
} ,
"TM" : {
"RC" : "C" ,
"E" : "U" ,
"RL" : "O"
}
}
} ,
"description" : {
"description_data" : [
{
"value" : "IBM PureApplication System 2.2.3.0 through 2.2.5.3 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 159240." ,
"lang" : "eng"
}
]
} ,
"CVE_data_meta" : {
"ID" : "CVE-2019-4224" ,
"STATE" : "PUBLIC" ,
"DATE_PUBLIC" : "2019-05-31T00:00:00" ,
"ASSIGNER" : "psirt@us.ibm.com"
} ,
"data_type" : "CVE" ,
"references" : {
"reference_data" : [
2019-03-18 02:59:02 +00:00
{
2019-06-26 15:01:07 +00:00
"name" : "https://www-01.ibm.com/support/docview.wss?uid=ibm10885602" ,
"url" : "https://www-01.ibm.com/support/docview.wss?uid=ibm10885602" ,
"title" : "IBM Security Bulletin 885602 (PureApplication System)" ,
"refsource" : "CONFIRM"
} ,
{
"title" : "X-Force Vulnerability Report" ,
"name" : "ibm-pure-cve20194224-sql-injection (159240)" ,
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/159240" ,
"refsource" : "XF"
2019-03-18 02:59:02 +00:00
}
2019-06-26 15:01:07 +00:00
]
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"vendor_name" : "IBM" ,
"product" : {
"product_data" : [
{
"product_name" : "PureApplication System" ,
"version" : {
"version_data" : [
{
"version_value" : "2.2.3.0"
} ,
{
"version_value" : "2.2.3.1"
} ,
{
"version_value" : "2.2.3.2"
} ,
{
"version_value" : "2.2.4.0"
} ,
{
"version_value" : "2.2.5.0"
} ,
{
"version_value" : "2.2.5.1"
} ,
{
"version_value" : "2.2.5.2"
} ,
{
"version_value" : "2.2.5.3"
}
]
}
}
]
}
}
2019-06-26 10:27:50 -04:00
]
2019-06-26 15:01:07 +00:00
}
} ,
"data_format" : "MITRE" ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"value" : "Data Manipulation" ,
"lang" : "eng"
}
]
}
]
} ,
"data_version" : "4.0"
}