mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
238 lines
8.0 KiB
JSON
238 lines
8.0 KiB
JSON
{
|
|
"id": "CVE-2016-9749",
|
|
"sourceIdentifier": "psirt@us.ibm.com",
|
|
"published": "2018-11-09T01:29:00.243",
|
|
"lastModified": "2019-10-09T23:20:42.977",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "IBM Campaign 9.1.0, 9.1.2, 10.0, and 10.1 could allow an authenticated user with access to the local network to bypass security due to lack of input validation. IBM X-Force ID: 120206."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "IBM Campaign 9.1.0, 9.1.2, 10.0 y 10.1 podr\u00edan permitir a un usuario autenticado con acceso a la red local omitir la seguridad debido a la falta de validaci\u00f3n de entradas. IBM X-Force ID: 120206."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
|
"attackVector": "LOCAL",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 3.3,
|
|
"baseSeverity": "LOW"
|
|
},
|
|
"exploitabilityScore": 1.8,
|
|
"impactScore": 1.4
|
|
},
|
|
{
|
|
"source": "psirt@us.ibm.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
|
"attackVector": "LOCAL",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 4.0,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 2.5,
|
|
"impactScore": 1.4
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
|
|
"accessVector": "LOCAL",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 2.1
|
|
},
|
|
"baseSeverity": "LOW",
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-20"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:campaign:9.1.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BB8CDF53-E4F3-4266-B726-27E0F420DB8C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:campaign:9.1.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "614B9180-7218-4DE2-A983-0B7A6CBF22D3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:campaign:9.1.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4FF3336A-C13F-4E4D-B1CA-17E7AC0DC1AD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:campaign:9.1.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "81382B84-9BE4-497A-BBF2-98BD6774DEB4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:campaign:9.1.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "928BC364-886A-41F3-B319-CB0EAA4F4EC4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:campaign:9.1.0.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E44E6EEA-82E5-453B-9DAE-1ED2ECA289AE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:campaign:9.1.0.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B5AD04FC-5E30-4908-80D1-0A11CDA0AAA0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:campaign:9.1.0.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "509A31B2-B8F9-4262-B8E7-552A0DDFA1A4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:campaign:9.1.0.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C862F26E-AA9F-4957-A3B8-A665DC102D31"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:campaign:9.1.0.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F79FAA3C-9C9F-4921-96C4-76EF3E218A13"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:campaign:9.1.0.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9F6945C1-8D7F-4A55-9948-84B41C6CEB98"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:campaign:9.1.0.11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "44C88420-F484-4C4F-B374-C19B9FD70D06"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:campaign:9.1.0.12:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CCBCF4EE-1699-4237-B5C3-DA1A65390A0A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:campaign:9.1.2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B2D3B593-77AC-4C26-A6DD-00684AC62F1B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:campaign:9.1.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "61888C3E-E95E-44A7-8772-039060223CFB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:campaign:9.1.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A0D4BFE1-1232-4AB8-A578-53082B0CBE68"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:campaign:9.1.2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B6F93C03-9E7D-4B42-B4D9-9D59B0ADF7A6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:campaign:9.1.2.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3642EB92-AE00-4D46-8C6A-1E46DF1B698B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:campaign:10.0.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B4F1729D-2DF7-4644-8446-6D18382F90E0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:campaign:10.0.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F87252DF-A1FA-4B90-83A6-BC4A6B26750F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:campaign:10.0.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6833440B-921B-4DF1-89CC-2BD7C3C84D70"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:campaign:10.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F262733F-7043-4F85-A265-534B8807CD2E"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.ibm.com/support/docview.wss?uid=ibm10738293",
|
|
"source": "psirt@us.ibm.com",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/120206",
|
|
"source": "psirt@us.ibm.com",
|
|
"tags": [
|
|
"VDB Entry",
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |