{ "id": "CVE-2019-4424", "sourceIdentifier": "psirt@us.ibm.com", "published": "2019-08-20T20:15:13.917", "lastModified": "2022-12-02T22:33:11.787", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "IBM Business Automation Workflow 18.0.0.0, 18.0.0.1, 18.0.0.2, 19.0.0.1, and 19.0.0.2 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 162770." }, { "lang": "es", "value": "IBM Business Automation Workflow 18.0.0.0, 18.0.0.1, 18.0.0.2, 19.0.0.1 y 19.0.0.2 es vulnerable a un ataque de inyecci\u00f3n de entidadexterna XML (XXE) al procesar datos XML. Un atacante remoto podr\u00eda aprovechar esta vulnerabilidad para exponer informaci\u00f3n confidencial o consumir recursos de memoria. ID de IBM X-Force: 162770." } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "LOW", "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 4.2 } ], "cvssMetricV30": [ { "source": "psirt@us.ibm.com", "type": "Secondary", "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, "impactScore": 4.2 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 4.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-611" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:*:*:*:*", "versionStartIncluding": "18.0.0.0", "versionEndIncluding": "19.0.0.2", "matchCriteriaId": "4BD15E1F-A2A1-4B07-9597-8FC9A3E47863" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:business_process_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "7.5.0.0", "versionEndIncluding": "7.5.1.2", "matchCriteriaId": "4E2DFAA5-B9A9-42D3-81FA-0815AD7BEE1E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:business_process_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "8.0.0.0", "versionEndIncluding": "8.0.1.3", "matchCriteriaId": "D7F25B9A-6BC9-474D-9EFD-80955C972F58" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:business_process_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "8.5.0.0", "versionEndIncluding": "8.5.0.2", "matchCriteriaId": "EC98B343-9E03-4056-8EB0-899B7A80CC88" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "7021B830-3EE4-446D-8D87-BBD2097A023E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:business_process_manager:8.5.6.0:-:*:*:*:*:*:*", "matchCriteriaId": "EE77FBBD-0033-4DDC-BBFC-8927C96A2DE6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:business_process_manager:8.5.6.0:cf01:*:*:*:*:*:*", "matchCriteriaId": "038632B3-66AF-4F11-9834-BEDF269AB235" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:business_process_manager:8.5.6.0:cf02:*:*:*:*:*:*", "matchCriteriaId": "30D2B29A-C262-4006-B004-085DA319AFB5" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:business_process_manager:8.5.7.0:-:*:*:*:*:*:*", "matchCriteriaId": "1874008E-86F5-4A15-B4D1-14AB666166ED" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:business_process_manager:8.5.7.0:cf2016.06:*:*:*:*:*:*", "matchCriteriaId": "51A3D3D0-45DE-4B42-8766-181793090845" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:business_process_manager:8.5.7.0:cf2016.09:*:*:*:*:*:*", "matchCriteriaId": "BE3CB0E7-437F-4EFB-94AE-9325D2CC6005" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:business_process_manager:8.5.7.0:cf2016.12:*:*:*:*:*:*", "matchCriteriaId": "79A27F7F-9EAE-4E2B-B5E8-2C82380D9C70" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:business_process_manager:8.5.7.0:cf2017.03:*:*:*:*:*:*", "matchCriteriaId": "3F268A9C-9E13-4573-A75E-308CA3193836" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:business_process_manager:8.5.7.0:cf2017.06:*:*:*:*:*:*", "matchCriteriaId": "4B1024F5-71EE-4484-8F78-525EE9FF2CCE" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:business_process_manager:8.6.0.0:-:*:*:-:*:*:*", "matchCriteriaId": "6DE7BCD3-C969-4248-B325-8EAAE9959797" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:business_process_manager:8.6.0.0:cf2017.12:*:*:-:*:*:*", "matchCriteriaId": "82A2B33F-5E31-410A-BBE8-B400F928CC16" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:business_process_manager:8.6.0.0:cf2018.03:*:*:-:*:*:*", "matchCriteriaId": "2D312C42-2CB3-499A-8A74-997155811C6A" } ] } ] } ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/162770", "source": "psirt@us.ibm.com", "tags": [ "VDB Entry", "Vendor Advisory" ] }, { "url": "https://www.ibm.com/support/docview.wss?uid=ibm10959537", "source": "psirt@us.ibm.com", "tags": [ "Vendor Advisory" ] } ] }