mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
93 lines
2.8 KiB
JSON
93 lines
2.8 KiB
JSON
{
|
|
"data_format": "MITRE",
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"refsource": "CONFIRM",
|
|
"title": "IBM Security Bulletin 6208038 (Sterling File Gateway)",
|
|
"url": "https://www.ibm.com/support/pages/node/6208038",
|
|
"name": "https://www.ibm.com/support/pages/node/6208038"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/175638",
|
|
"name": "ibm-sterling-cve20204259-sec-bypass (175638)",
|
|
"refsource": "XF",
|
|
"title": "X-Force Vulnerability Report"
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Bypass Security"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"impact": {
|
|
"cvssv3": {
|
|
"BM": {
|
|
"SCORE": "6.500",
|
|
"AV": "N",
|
|
"UI": "N",
|
|
"S": "U",
|
|
"C": "N",
|
|
"PR": "L",
|
|
"A": "N",
|
|
"AC": "L",
|
|
"I": "H"
|
|
},
|
|
"TM": {
|
|
"RC": "C",
|
|
"RL": "O",
|
|
"E": "U"
|
|
}
|
|
}
|
|
},
|
|
"data_type": "CVE",
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "IBM",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "2.2.0.0"
|
|
},
|
|
{
|
|
"version_value": "6.0.3.1"
|
|
}
|
|
]
|
|
},
|
|
"product_name": "Sterling File Gateway"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"value": "IBM Sterling File Gateway 2.2.0.0 through 6.0.3.1 could allow an authenticated user could manipulate cookie information and remove or add modules from the cookie to access functionality not authorized to. IBM X-Force ID: 175638.",
|
|
"lang": "eng"
|
|
}
|
|
]
|
|
},
|
|
"data_version": "4.0",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2020-4259",
|
|
"STATE": "PUBLIC",
|
|
"ASSIGNER": "psirt@us.ibm.com",
|
|
"DATE_PUBLIC": "2020-05-13T00:00:00"
|
|
}
|
|
} |