{ "affects": { "vendor": { "vendor_data": [ { "vendor_name": "IBM", "product": { "product_data": [ { "version": { "version_data": [ { "version_value": "7.3.3.Patch2" } ] }, "product_name": "Qradar" }, { "version": { "version_data": [ { "version_value": "7.3.0" } ] }, "product_name": "QRadar" } ] } } ] } }, "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "STATE": "PUBLIC", "ID": "CVE-2020-4294", "DATE_PUBLIC": "2020-04-14T00:00:00" }, "impact": { "cvssv3": { "TM": { "RC": "C", "E": "U", "RL": "O" }, "BM": { "UI": "N", "AV": "N", "PR": "L", "AC": "L", "C": "L", "SCORE": "6.300", "I": "L", "S": "U", "A": "L" } } }, "data_type": "CVE", "references": { "reference_data": [ { "name": "https://www.ibm.com/support/pages/node/6189663", "refsource": "CONFIRM", "url": "https://www.ibm.com/support/pages/node/6189663", "title": "IBM Security Bulletin 6189663 (Qradar)" }, { "title": "X-Force Vulnerability Report", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/176404", "refsource": "XF", "name": "ibm-qradar-cve20204294-ssrf (176404)" }, { "refsource": "FULLDISC", "name": "20200421 QRadar RssFeedItem Server-Side Request Forgery vulnerability", "url": "http://seclists.org/fulldisclosure/2020/Apr/35" }, { "refsource": "MISC", "name": "http://packetstormsecurity.com/files/157329/QRadar-Community-Edition-7.3.1.6-Server-Side-Request-Forgery.html", "url": "http://packetstormsecurity.com/files/157329/QRadar-Community-Edition-7.3.1.6-Server-Side-Request-Forgery.html" } ] }, "description": { "description_data": [ { "value": "IBM QRadar 7.3.0 to 7.3.3 Patch 2 is vulnerable to Server Side Request Forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. IBM X-ForceID: 176404.", "lang": "eng" } ] }, "data_version": "4.0", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Gain Access" } ] } ] }, "data_format": "MITRE" }