René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

111 lines
3.6 KiB
JSON

{
"id": "CVE-2012-4816",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2012-12-26T18:55:01.220",
"lastModified": "2017-08-29T01:32:21.900",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "IBM Rational Automation Framework (RAF) 3.x through 3.0.0.5 allows remote attackers to bypass intended Env Gen Wizard (aka Environment Generation Wizard) access restrictions by visiting context roots in HTTP sessions on port 8080."
},
{
"lang": "es",
"value": "IBM Rational Automation Framework (RAF) v3.x hasta v3.0.0.5 permite a atacantes remotos evitar las restricciones de acceso a Env Gen Wizard (Asistente para la Generaci\u00f3n de entorno) al visitar ra\u00edces de contexto en sesiones HTTP en el puerto 8080.\r\n"
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_automation_framework:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D5A9F44C-C660-47BB-ADD5-B9797F33E841"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_automation_framework:3.0.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "66D7E002-4DE7-4BB6-9A30-A6869F7B0124"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_automation_framework:3.0.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A2F4869C-39FD-43F9-994A-7304D84840B4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_automation_framework:3.0.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A70C3F8A-55E0-46C1-B927-B2DB85A1FEBC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_automation_framework:3.0.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9FA3679D-81C6-4390-A27F-F4629806BB67"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:rational_automation_framework:3.0.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "ED9680A6-DC0A-4967-A398-82E36D2D2219"
}
]
}
]
}
],
"references": [
{
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21620359",
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78379",
"source": "psirt@us.ibm.com"
}
]
}