mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
90 lines
2.8 KiB
JSON
90 lines
2.8 KiB
JSON
{
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "https://www.ibm.com/support/pages/node/6249981",
|
|
"refsource": "CONFIRM",
|
|
"title": "IBM Security Bulletin 6249981 (Planning Analytics)",
|
|
"url": "https://www.ibm.com/support/pages/node/6249981"
|
|
},
|
|
{
|
|
"name": "ibm-planning-cve20204527-info-disc (182631)",
|
|
"refsource": "XF",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/182631",
|
|
"title": "X-Force Vulnerability Report"
|
|
}
|
|
]
|
|
},
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "psirt@us.ibm.com",
|
|
"STATE": "PUBLIC",
|
|
"ID": "CVE-2020-4527",
|
|
"DATE_PUBLIC": "2020-07-17T00:00:00"
|
|
},
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"value": "Obtain Information",
|
|
"lang": "eng"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Planning Analytics",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "2.0"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "IBM"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"impact": {
|
|
"cvssv3": {
|
|
"TM": {
|
|
"RC": "C",
|
|
"E": "U",
|
|
"RL": "O"
|
|
},
|
|
"BM": {
|
|
"UI": "N",
|
|
"AV": "N",
|
|
"AC": "H",
|
|
"C": "H",
|
|
"SCORE": "5.900",
|
|
"S": "U",
|
|
"I": "N",
|
|
"PR": "N",
|
|
"A": "N"
|
|
}
|
|
}
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "IBM Planning Analytics 2.0 could allow a remote attacker to obtain sensitive information, caused by the failure to set the Secure flag for the session cookie in TLS mode. By intercepting its transmission within an HTTP session, an attacker could exploit this vulnerability to capture the cookie and obtain sensitive information. IBM X-Force ID: 182631."
|
|
}
|
|
]
|
|
},
|
|
"data_format": "MITRE"
|
|
} |