René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

276 lines
10 KiB
JSON

{
"id": "CVE-2015-7454",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2016-03-21T14:59:00.120",
"lastModified": "2016-12-03T03:12:56.117",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Business Space in IBM WebSphere Process Server 6.1.2.0 through 7.0.0.5 and Business Process Manager Advanced 7.5.x through 7.5.1.2, 8.0.x through 8.0.1.3, 8.5.0.x through 8.5.0.2, 8.5.5.x through 8.5.5.0, and 8.5.6.x through 8.5.6.2 allows remote authenticated users to bypass intended access restrictions and create an arbitrary page or space via unspecified vectors."
},
{
"lang": "es",
"value": "Business Space en IBM WebSphere Process Server 6.1.2.0 hasta la versi\u00f3n 7.0.0.5 y Business Process Manager Advanced 7.5.x hasta la versi\u00f3n 7.5.1.2, 8.0.x hasta la versi\u00f3n 8.0.1.3, 8.5.0.x hasta la versi\u00f3n 8.5.0.2, 8.5.5.x hasta la versi\u00f3n 8.5.5.0 y 8.5.6.x hasta la versi\u00f3n 8.5.6.2 permite a usuarios remotos autenticados eludir las restricciones destinadas al acceso y crear una p\u00e1gina o un espacio arbitrarios a trav\u00e9s de vectores no especificados."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:websphere_process_server:6.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "07586269-73DA-4189-B0BD-95D4B0091FAD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:websphere_process_server:6.1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0D43CB11-E506-4014-899E-417BDF7E0929"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:websphere_process_server:6.1.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2B0F3654-3197-4C88-A7B0-F0A7DBF9A9DE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:websphere_process_server:6.1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "25634A4E-722F-4AC4-AB42-9C50FE5DD093"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:websphere_process_server:6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B834408E-3838-4473-806C-84A4E3AAB638"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:websphere_process_server:6.2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "45F5BEC8-746C-4AF4-99B4-39298CED51A6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:websphere_process_server:6.2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "744AF0AC-C99F-4D83-85BE-949C3CC58C9B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:websphere_process_server:6.2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F8D07878-33BE-40B8-A6DA-BD5B2BDF6CFD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:websphere_process_server:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "116EA95E-3845-4045-9E9D-F370D6D48A5E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:websphere_process_server:7.0.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1278C0A9-D694-4E1A-8C58-E22995B346B9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:websphere_process_server:7.0.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "98B87B46-4C5C-4894-A840-D5354E0519B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:websphere_process_server:7.0.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "18B56787-8A91-46DD-ACAB-59C8439A2815"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:websphere_process_server:7.0.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "68E45D5B-C0AE-41CB-BF07-B4692F0062D6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:websphere_process_server:7.0.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "DF76BE59-BBBD-42D9-96EA-5974CC489F8F"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_process_manager:7.5.0.0:*:*:*:advanced:*:*:*",
"matchCriteriaId": "91BDDE54-95C6-4E95-9427-D83E61355E3D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_process_manager:7.5.0.1:*:*:*:advanced:*:*:*",
"matchCriteriaId": "8057C7D0-978D-490B-BE80-597A2CB27A77"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_process_manager:7.5.1.0:*:*:*:advanced:*:*:*",
"matchCriteriaId": "3DEBE193-CDE1-406C-9042-4085AA0EED8E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_process_manager:7.5.1.1:*:*:*:advanced:*:*:*",
"matchCriteriaId": "EF781F2F-05FB-4DBD-8BC1-98A630CD375A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_process_manager:7.5.1.2:*:*:*:advanced:*:*:*",
"matchCriteriaId": "0F1442C9-ED96-40C5-BE20-987C928BAD9D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_process_manager:8.0.0.0:*:*:*:advanced:*:*:*",
"matchCriteriaId": "E71AC948-9F71-403E-8035-172D5F667B54"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_process_manager:8.0.1.0:*:*:*:advanced:*:*:*",
"matchCriteriaId": "E77872E9-D66C-47FF-AA1D-7764D65997A8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_process_manager:8.0.1.1:*:*:*:advanced:*:*:*",
"matchCriteriaId": "7B3D03C8-B7F4-43AF-9270-555507AAC527"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_process_manager:8.0.1.2:*:*:*:advanced:*:*:*",
"matchCriteriaId": "E69BBEFA-B321-4085-AEA1-BAE2B0B54524"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_process_manager:8.0.1.3:*:*:*:advanced:*:*:*",
"matchCriteriaId": "BE4F0900-83C3-4228-9F3B-2664C1C816F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:advanced:*:*:*",
"matchCriteriaId": "9942841D-3E36-4159-AA5A-B534CB701B6A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:advanced:*:*:*",
"matchCriteriaId": "7A1FCB4E-DC46-4780-9017-1E8E789E785F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_process_manager:8.5.0.2:*:*:*:advanced:*:*:*",
"matchCriteriaId": "19B921EC-DE16-4A2B-BB29-B02A9B416470"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:advanced:*:*:*",
"matchCriteriaId": "00DC7609-2519-4DB5-AA5E-A1CFCE0DA5A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_process_manager:8.5.6.0:*:*:*:advanced:*:*:*",
"matchCriteriaId": "66A4A455-A75B-4363-AC6D-DAD50287EB99"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_process_manager:8.5.6.1:*:*:*:advanced:*:*:*",
"matchCriteriaId": "240E404A-0420-4731-8DFE-076746B14807"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_process_manager:8.5.6.2:*:*:*:advanced:*:*:*",
"matchCriteriaId": "66327978-D257-4ADE-8AEA-22547B0E4541"
}
]
}
]
}
],
"references": [
{
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1JR54678",
"source": "psirt@us.ibm.com"
},
{
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21972005",
"source": "psirt@us.ibm.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/85089",
"source": "psirt@us.ibm.com"
},
{
"url": "http://www.securitytracker.com/id/1035319",
"source": "psirt@us.ibm.com"
}
]
}