René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

183 lines
6.4 KiB
JSON

{
"id": "CVE-2017-1551",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2017-09-25T16:29:00.413",
"lastModified": "2017-10-03T17:49:54.897",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "IBM API Connect 5.0.0.0 through 5.0.7.2 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim. IBM X-Force ID: 131291."
},
{
"lang": "es",
"value": "IBM API Connect desde la versi\u00f3n 5.0.0.0 hasta la 5.0.7.2 podr\u00eda permitir que un atacante remoto secuestre la acci\u00f3n de clicado de la v\u00edctima. Al persuadir a una v\u00edctima para que visite un sitio web malicioso, un atacante remoto podr\u00eda explotar esta vulnerabilidad para secuestrar las acciones de clicado de la v\u00edctima y, probablemente, lanzar m\u00e1s ataques contra la v\u00edctima. IBM X-Force ID: 131291."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:api_connect:5.0.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6B43F8D4-A60E-4C56-B868-8616958A0B74"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:api_connect:5.0.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "39A4F3B4-A3D8-4281-BBB1-8B95297657F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:api_connect:5.0.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4049722A-338F-49FA-A9B2-2A432F04D2A8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:api_connect:5.0.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4C12F86C-FBDF-4231-B4EA-4279FC730088"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:api_connect:5.0.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1BBC9AEC-CD8B-4F2A-99A7-469B93107B9F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:api_connect:5.0.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BBB03CE4-C3EE-41E9-9321-9AB9829FDB5D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:api_connect:5.0.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C7B9AC88-C53D-4810-B21E-7A836524859B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:api_connect:5.0.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8D8AD67C-0221-4EF1-B0A2-C13CEE62D27F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:api_connect:5.0.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "61864755-C7B6-416C-9D3E-334AB3D94825"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:api_connect:5.0.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7FCB9030-50A4-4B9B-8457-9DB9E13B3211"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:api_connect:5.0.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4E2679C4-FF15-4FB5-A6D6-11229AB5EFF5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:api_connect:5.0.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E7BB28DE-AF37-4444-8BA5-9928072C2F6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:api_connect:5.0.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "336EC55F-E19B-4D26-8AEA-40DC40F6C0A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:api_connect:5.0.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FBB6EF04-A24E-4857-8C7A-DE779AFA8B70"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:api_connect:5.0.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6C6AFDC6-3596-4640-8E92-984B308A1C75"
}
]
}
]
}
],
"references": [
{
"url": "http://www.ibm.com/support/docview.wss?uid=swg22008372",
"source": "psirt@us.ibm.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/131291",
"source": "psirt@us.ibm.com",
"tags": [
"VDB Entry",
"Vendor Advisory"
]
}
]
}