Lucene search

K
cveIbmCVE-2016-6096
HistoryFeb 07, 2017 - 4:59 p.m.

CVE-2016-6096

2017-02-0716:59:00
CWE-79
ibm
web.nvd.nist.gov
23
ibm
tivoli
key lifecycle manager
cross-site scripting
vulnerability
nvd
credentials disclosure

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

6

Confidence

High

EPSS

0.001

Percentile

30.7%

IBM Tivoli Key Lifecycle Manager 2.0.1, 2.5, and 2.6 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.

Affected configurations

Nvd
Vulners
Node
ibmsecurity_key_lifecycle_managerMatch2.5.0.0
OR
ibmsecurity_key_lifecycle_managerMatch2.5.0.1
OR
ibmsecurity_key_lifecycle_managerMatch2.5.0.2
OR
ibmsecurity_key_lifecycle_managerMatch2.5.0.3
OR
ibmsecurity_key_lifecycle_managerMatch2.5.0.4
OR
ibmsecurity_key_lifecycle_managerMatch2.5.0.5
OR
ibmsecurity_key_lifecycle_managerMatch2.5.0.6
OR
ibmsecurity_key_lifecycle_managerMatch2.5.0.7
OR
ibmsecurity_key_lifecycle_managerMatch2.6.0.0
OR
ibmsecurity_key_lifecycle_managerMatch2.6.0.1
OR
ibmsecurity_key_lifecycle_managerMatch2.6.0.2
OR
ibmtivoli_key_lifecycle_managerMatch2.0.1
OR
ibmtivoli_key_lifecycle_managerMatch2.0.1.1
OR
ibmtivoli_key_lifecycle_managerMatch2.0.1.2
OR
ibmtivoli_key_lifecycle_managerMatch2.0.1.3
OR
ibmtivoli_key_lifecycle_managerMatch2.0.1.4
OR
ibmtivoli_key_lifecycle_managerMatch2.0.1.5
OR
ibmtivoli_key_lifecycle_managerMatch2.0.1.6
OR
ibmtivoli_key_lifecycle_managerMatch2.0.1.7
OR
ibmtivoli_key_lifecycle_managerMatch2.0.1.8
VendorProductVersionCPE
ibmsecurity_key_lifecycle_manager2.5.0.0cpe:2.3:a:ibm:security_key_lifecycle_manager:2.5.0.0:*:*:*:*:*:*:*
ibmsecurity_key_lifecycle_manager2.5.0.1cpe:2.3:a:ibm:security_key_lifecycle_manager:2.5.0.1:*:*:*:*:*:*:*
ibmsecurity_key_lifecycle_manager2.5.0.2cpe:2.3:a:ibm:security_key_lifecycle_manager:2.5.0.2:*:*:*:*:*:*:*
ibmsecurity_key_lifecycle_manager2.5.0.3cpe:2.3:a:ibm:security_key_lifecycle_manager:2.5.0.3:*:*:*:*:*:*:*
ibmsecurity_key_lifecycle_manager2.5.0.4cpe:2.3:a:ibm:security_key_lifecycle_manager:2.5.0.4:*:*:*:*:*:*:*
ibmsecurity_key_lifecycle_manager2.5.0.5cpe:2.3:a:ibm:security_key_lifecycle_manager:2.5.0.5:*:*:*:*:*:*:*
ibmsecurity_key_lifecycle_manager2.5.0.6cpe:2.3:a:ibm:security_key_lifecycle_manager:2.5.0.6:*:*:*:*:*:*:*
ibmsecurity_key_lifecycle_manager2.5.0.7cpe:2.3:a:ibm:security_key_lifecycle_manager:2.5.0.7:*:*:*:*:*:*:*
ibmsecurity_key_lifecycle_manager2.6.0.0cpe:2.3:a:ibm:security_key_lifecycle_manager:2.6.0.0:*:*:*:*:*:*:*
ibmsecurity_key_lifecycle_manager2.6.0.1cpe:2.3:a:ibm:security_key_lifecycle_manager:2.6.0.1:*:*:*:*:*:*:*
Rows per page:
1-10 of 201

CNA Affected

[
  {
    "product": "Key Lifecycle Manager",
    "vendor": "IBM Corporation",
    "versions": [
      {
        "status": "affected",
        "version": "2.5"
      },
      {
        "status": "affected",
        "version": "1.0"
      },
      {
        "status": "affected",
        "version": "2.0"
      },
      {
        "status": "affected",
        "version": "2.0.1"
      },
      {
        "status": "affected",
        "version": "2.6"
      }
    ]
  }
]

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

6

Confidence

High

EPSS

0.001

Percentile

30.7%

Related for CVE-2016-6096