mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
208 lines
8.3 KiB
JSON
208 lines
8.3 KiB
JSON
{
|
|
"data_format": "MITRE",
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"title": "IBM Security Bulletin 6475919 (Rational Rhapsody Design Manager)",
|
|
"url": "https://www.ibm.com/support/pages/node/6475919",
|
|
"refsource": "CONFIRM",
|
|
"name": "https://www.ibm.com/support/pages/node/6475919"
|
|
},
|
|
{
|
|
"title": "X-Force Vulnerability Report",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/192434",
|
|
"name": "ibm-jazz-cve20204974-ssrf (192434)",
|
|
"refsource": "XF"
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "IBM",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Engineering Test Management",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "7.0.0"
|
|
},
|
|
{
|
|
"version_value": "7.0.1"
|
|
},
|
|
{
|
|
"version_value": "7.0.2"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "6.0.6"
|
|
},
|
|
{
|
|
"version_value": "6.0.6.1"
|
|
}
|
|
]
|
|
},
|
|
"product_name": "Rational Team Concert"
|
|
},
|
|
{
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "6.0.6"
|
|
},
|
|
{
|
|
"version_value": "6.0.6.1"
|
|
}
|
|
]
|
|
},
|
|
"product_name": "Rational Quality Manager"
|
|
},
|
|
{
|
|
"product_name": "Rational DOORS Next Generation",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "6.0.6"
|
|
},
|
|
{
|
|
"version_value": "6.0.6.1"
|
|
},
|
|
{
|
|
"version_value": "7.0"
|
|
},
|
|
{
|
|
"version_value": "7.0.1"
|
|
},
|
|
{
|
|
"version_value": "7.0.2"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Rational Collaborative Lifecycle Management",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "6.0.2"
|
|
},
|
|
{
|
|
"version_value": "6.0.6"
|
|
},
|
|
{
|
|
"version_value": "6.0.6.1"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "7.0"
|
|
},
|
|
{
|
|
"version_value": "7.0.1"
|
|
},
|
|
{
|
|
"version_value": "7.0.2"
|
|
}
|
|
]
|
|
},
|
|
"product_name": "Engineering Workflow Management"
|
|
},
|
|
{
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "7.0"
|
|
},
|
|
{
|
|
"version_value": "7.0.1"
|
|
},
|
|
{
|
|
"version_value": "7.0.2"
|
|
}
|
|
]
|
|
},
|
|
"product_name": "Engineering Lifecycle Optimization"
|
|
},
|
|
{
|
|
"product_name": "Rational Engineering Lifecycle Manager",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "6.0.2"
|
|
},
|
|
{
|
|
"version_value": "6.0.6"
|
|
},
|
|
{
|
|
"version_value": "6.0.6.1"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"CVE_data_meta": {
|
|
"DATE_PUBLIC": "2021-07-27T00:00:00",
|
|
"ID": "CVE-2020-4974",
|
|
"ASSIGNER": "psirt@us.ibm.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"value": "Gain Access",
|
|
"lang": "eng"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"data_version": "4.0",
|
|
"impact": {
|
|
"cvssv3": {
|
|
"TM": {
|
|
"RC": "C",
|
|
"E": "U",
|
|
"RL": "O"
|
|
},
|
|
"BM": {
|
|
"A": "L",
|
|
"UI": "N",
|
|
"C": "L",
|
|
"SCORE": "6.300",
|
|
"AV": "N",
|
|
"PR": "L",
|
|
"I": "L",
|
|
"AC": "L",
|
|
"S": "U"
|
|
}
|
|
}
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"value": "IBM Jazz Foundation products are vulnerable to server side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. IBM X-Force ID: 192434.",
|
|
"lang": "eng"
|
|
}
|
|
]
|
|
},
|
|
"data_type": "CVE"
|
|
} |