200 lines
6.8 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2011-1046",
"sourceIdentifier": "cve@mitre.org",
"published": "2011-02-21T18:00:01.567",
"lastModified": "2024-11-21T01:25:23.780",
2023-04-24 12:24:31 +02:00
"vulnStatus": "Modified",
"cveTags": [],
2023-04-24 12:24:31 +02:00
"descriptions": [
{
"lang": "en",
"value": "IBM FileNet P8 Content Engine (aka P8CE) 4.0.1 through 5.0.0, as used in FileNet P8 Content Manager (CM) and FileNet P8 Business Process Manager (BPM), does not require the PRIVILEGED_WRITE access role for all intended Object Store modifications, which allows remote attackers to change a privileged property of an object via unspecified vectors."
},
{
"lang": "es",
"value": "IBM FileNet P8 Content Engine (tambien conocida como P8CE)v4.0.1 hasta v5.0.0, usada en FileNet P8 Content Manager (CM) yFileNet P8 Business Process Manager (BPM),no requiere el rol de acceso PRIVILEGED_WRITE destinados a modificaciones de objetos de la tienda, que permite a atacantes remotos a cambiar una propiedad privilegiada de un objeto a trav\u00e9s de vectores no especificados"
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"baseScore": 5.0,
2023-04-24 12:24:31 +02:00
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
2023-04-24 12:24:31 +02:00
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:filenet_p8_content_engine:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4F200402-0115-4055-8285-F76F7A684A75"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:filenet_p8_content_engine:4.0.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "F6158EE1-FCAA-471E-94F2-CB45094F2A5F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:filenet_p8_content_engine:4.0.1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "77EB1C8B-FEDE-413F-8889-9059027B5B3A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:filenet_p8_content_engine:4.0.1.12:*:*:*:*:*:*:*",
"matchCriteriaId": "D2DB5B49-494D-42EA-B723-184B4D4D9491"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:filenet_p8_content_engine:4.0.1.13:*:*:*:*:*:*:*",
"matchCriteriaId": "2B432C59-2B7E-46A6-83FA-A44E055B34A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:filenet_p8_content_engine:4.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0068953F-D3EE-4AAF-A156-60232F7E1FDF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:filenet_p8_content_engine:4.5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "76EDE058-D454-4096-A4A6-514D6B6A1D20"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:filenet_p8_content_engine:4.5.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CEFB9431-E2DC-4950-9F58-8637A7FCFD62"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:filenet_p8_content_engine:4.5.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D9F99A71-F075-40D0-9F5F-DDE4ABBAAB9D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:filenet_p8_content_engine:4.5.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "127D2A94-D74F-4BA8-9CE8-7C893F2DD6BE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:filenet_p8_content_engine:4.5.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "65C8EB6B-4D58-466E-BCFA-D6A085D043BB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:filenet_p8_content_engine:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "28997462-17A0-490F-A62E-48098E245B9C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:filenet_p8_business_process_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E13A33FB-D20C-4010-8CE8-249745210F61"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:filenet_p8_content_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "63637F57-35D7-4B16-8D18-AC958475CD49"
}
]
}
]
}
],
"references": [
{
"url": "http://secunia.com/advisories/43347",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
2023-04-24 12:24:31 +02:00
{
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21462438",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/46432",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0423",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65448",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/43347",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21462438",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/46432",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0423",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65448",
"source": "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}