2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2013-0520" ,
"sourceIdentifier" : "psirt@us.ibm.com" ,
"published" : "2013-05-10T11:42:29.940" ,
2025-04-11 02:06:08 +00:00
"lastModified" : "2025-04-11T00:51:21.963" ,
"vulnStatus" : "Deferred" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "IBM Sterling Secure Proxy 3.2.0 and 3.3.01 before 3.3.01.23 Interim Fix 1, 3.4.0 before 3.4.0.6 Interim Fix 1, and 3.4.1 before 3.4.1.7 allows remote authenticated users to obtain sensitive Java stack-trace information by providing invalid input data."
} ,
{
"lang" : "es" ,
"value" : "IBM Sterling Secure Proxy v3.2.0 y v3.3.01 anterior a v3.3.01.23 Interim Fix 1, v3.4.0 anterior a v3.4.0.6 Interim Fix 1, y v3.4.1 anterior a v3.4.1.7 permite a atacantes remotos autenticados obtener informaci\u00f3n sensible de la pila de Java (\"Java stack-trace\")proporcionando datos de entrada inv\u00e1lidos."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:S/C:P/I:N/A:N" ,
2024-11-22 19:15:24 +00:00
"baseScore" : 4.0 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "SINGLE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "NONE" ,
2024-11-22 19:15:24 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 8.0 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-20"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:sterling_secure_proxy:3.2.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "76FE7EA7-FDF8-455D-B7B0-E16B0351AC4B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:sterling_secure_proxy:3.3.0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B250B238-B5F7-4BD8-925F-A56FE09E7D38"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:sterling_secure_proxy:3.4.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DB04C5D8-4791-480F-9B94-F9AF50261EE2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:sterling_secure_proxy:3.4.1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "46AF20EF-6C11-4838-9916-99BEEAF90384"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:sterling_secure_proxy:3.4.1.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DA2E914D-19F8-4014-B20E-67A2B880F5AE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:sterling_secure_proxy:3.4.1.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CC7085CC-C810-4360-8374-59A6B3E13F66"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:sterling_secure_proxy:3.4.1.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "810C1644-6E69-413D-8AB8-C4CC45DC93DE"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21636369" ,
"source" : "psirt@us.ibm.com" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/83433" ,
"source" : "psirt@us.ibm.com"
2024-11-22 19:15:24 +00:00
} ,
{
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21636369" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/83433" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}