cvelist/2019/6xxx/CVE-2019-6159.json
2019-08-19 16:00:52 +00:00

96 lines
3.5 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "psirt@lenovo.com",
"DATE_PUBLIC": "2019-08-08T20:00:00.000Z",
"ID": "CVE-2019-6159",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "legacy System x IMM (IMM v1) firmware",
"version": {
"version_data": [
{
"affected": "=",
"version_value": "various"
}
]
}
}
]
},
"vendor_name": "IBM"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Lenovo thanks Christopher Arnold for reporting this issue."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A stored cross-site scripting (XSS) vulnerability exists in various firmware versions of the legacy IBM System x IMM (IMM v1) embedded Baseboard Management Controller (BMC). This vulnerability could allow an unauthenticated user to cause JavaScript code to be stored in the IMM log which may then be executed in the user's web browser when IMM log records containing the JavaScript code are viewed. The JavaScript code is not executed on IMM itself. The later IMM2 (IMM v2) is not affected."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "code execution"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://support.lenovo.com/solutions/LEN-24785",
"name": "https://support.lenovo.com/solutions/LEN-24785"
}
]
},
"solution": [
{
"lang": "eng",
"value": "A patch will not be available for this vulnerability as IMM (IMM v1) is approaching end of support.\n\nTo mitigate this vulnerability, users should:\n\nRestrict network access of the IMM web interface to only trusted networks.\nView IMM logs through an SSH session or the IMM web interface after disabling JavaScript in the web browser.\nSend IMM logs to a log management system that does not render JavaScript."
}
],
"source": {
"advisory": "LEN-24785",
"discovery": "UNKNOWN"
}
}