{ "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Gain Privileges" } ] } ] }, "data_format": "MITRE", "CVE_data_meta": { "ID": "CVE-2020-4272", "DATE_PUBLIC": "2020-04-14T00:00:00", "STATE": "PUBLIC", "ASSIGNER": "psirt@us.ibm.com" }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "IBM", "product": { "product_data": [ { "product_name": "QRadar", "version": { "version_data": [ { "version_value": "7.3.0" } ] } }, { "product_name": "Qradar", "version": { "version_data": [ { "version_value": "7.3.3.Patch2" } ] } } ] } } ] } }, "impact": { "cvssv3": { "BM": { "C": "L", "SCORE": "5.500", "UI": "R", "AV": "N", "AC": "L", "PR": "L", "I": "L", "A": "L", "S": "U" }, "TM": { "RC": "C", "E": "U", "RL": "O" } } }, "references": { "reference_data": [ { "url": "https://www.ibm.com/support/pages/node/6189645", "refsource": "CONFIRM", "title": "IBM Security Bulletin 6189645 (Qradar)", "name": "https://www.ibm.com/support/pages/node/6189645" }, { "name": "ibm-qradar-cve20204272-file-upload (175898)", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/175898", "refsource": "XF", "title": "X-Force Vulnerability Report" }, { "refsource": "FULLDISC", "name": "20200421 Arbitrary class instantiation & local file inclusion vulnerability in QRadar Forensics web application", "url": "http://seclists.org/fulldisclosure/2020/Apr/40" }, { "refsource": "MISC", "name": "http://packetstormsecurity.com/files/157337/QRadar-Community-Edition-7.3.1.6-Arbitrary-Object-Instantiation.html", "url": "http://packetstormsecurity.com/files/157337/QRadar-Community-Edition-7.3.1.6-Arbitrary-Object-Instantiation.html" } ] }, "data_type": "CVE", "description": { "description_data": [ { "value": "IBM QRadar 7.3.0 to 7.3.3 Patch 2 could allow a remote attacker to include arbitrary files. A remote attacker could send a specially-crafted request specify a malicious file from a remote system, which could allow the attacker to execute arbitrary code on the vulnerable server. IBM X-ForceID: 175898.", "lang": "eng" } ] }, "data_version": "4.0" }