mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
220 lines
8.1 KiB
JSON
220 lines
8.1 KiB
JSON
{
|
|
"id": "CVE-2020-4318",
|
|
"sourceIdentifier": "psirt@us.ibm.com",
|
|
"published": "2020-07-28T12:15:12.207",
|
|
"lastModified": "2020-07-28T15:36:45.817",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "IBM Intelligent Operations Center for Emergency Management, Intelligent Operations Center (IOC), and IBM Water Operations for Waternamics are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 177356."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "IBM Intelligent Operations Center for Emergency Management, Intelligent Operations Center (IOC), e IBM Water Operations for Waternamics son vulnerables a un ataque de tipo cross-site scripting. Esta vulnerabilidad permite a usuarios insertar c\u00f3digo JavaScript arbitrario en la Interfaz de Usuario Web, alterando as\u00ed la funcionalidad prevista conllevando potencialmente a una divulgaci\u00f3n de credenciales dentro de una sesi\u00f3n confiable. IBM X-Force ID: 177356"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.4,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 2.3,
|
|
"impactScore": 2.7
|
|
}
|
|
],
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "psirt@us.ibm.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.4,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 2.3,
|
|
"impactScore": 2.7
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "SINGLE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 3.5
|
|
},
|
|
"baseSeverity": "LOW",
|
|
"exploitabilityScore": 6.8,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:intelligent_operations_center:5.1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "72EB2ED2-3D2F-49DC-BB6E-BC658FA5B876"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:intelligent_operations_center:5.1.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "11F14355-EE68-46B1-A79D-DD0F523AC0A4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:intelligent_operations_center:5.1.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3EE1BFF9-EE1E-4733-B94F-2281D5CF0144"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:intelligent_operations_center:5.1.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BCD05362-864D-47E9-B68A-26046948C3F3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:intelligent_operations_center:5.1.0.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1882E6F1-6B3C-4455-9021-D60EAD5B3435"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:intelligent_operations_center:5.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3A402F85-7E03-43E1-8BBD-B149CB2D48AB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:intelligent_operations_center:5.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "22ED3477-717E-457B-BDA4-B2C054EFFDD4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:intelligent_operations_center_for_emergency_management:5.1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AE42717E-FDB9-4BFF-B6B9-B5DF6086F6AA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:intelligent_operations_center_for_emergency_management:5.1.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D53A7CA9-E13C-4BEE-9768-0001D664C02E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:intelligent_operations_center_for_emergency_management:5.1.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8DC05EB9-3082-4621-A6BD-5B3C887F4D18"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:intelligent_operations_center_for_emergency_management:5.1.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "83DF6BD3-2A8B-4651-ACDF-B2CA8F98A2D5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:intelligent_operations_center_for_emergency_management:5.1.0.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "492DC497-CEC3-4E38-AE2F-4CAD3D6CFA4F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:water_operations_for_waternamics:5.1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "34EDD3A3-7840-44EF-ADCF-87877119978E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:water_operations_for_waternamics:5.1.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "50132041-E851-4B01-BAA8-DCC5FF650D09"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:water_operations_for_waternamics:5.1.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1EABDC4F-0DEE-4B72-807B-D4C1647C4A48"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:water_operations_for_waternamics:5.1.0.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D961AFAA-9371-42F4-856B-45F2FBDC6AE7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:water_operations_for_waternamics:5.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "66E4336D-82B7-4BDA-B113-A3B39037DE22"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ibm:water_operations_for_waternamics:5.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BEAEE4BF-C4A9-48DE-A253-F49AD3D251D5"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/177356",
|
|
"source": "psirt@us.ibm.com",
|
|
"tags": [
|
|
"VDB Entry",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.ibm.com/support/pages/node/6253297",
|
|
"source": "psirt@us.ibm.com",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |