Lucene search

K
cveIbmCVE-2018-1384
HistoryMar 30, 2018 - 4:29 p.m.

CVE-2018-1384

2018-03-3016:29:00
CWE-79
ibm
web.nvd.nist.gov
25
ibm
bpm
8.6
xss
vulnerability
javascript
credentials
disclosure
security
nvd

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

AI Score

5.2

Confidence

High

EPSS

0.001

Percentile

35.1%

IBM Business Process Manager 8.6 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 138135.

Affected configurations

Nvd
Vulners
Node
ibmbusiness_process_managerMatch7.5.0.0advanced
OR
ibmbusiness_process_managerMatch7.5.0.1advanced
OR
ibmbusiness_process_managerMatch7.5.1.0advanced
OR
ibmbusiness_process_managerMatch7.5.1.1advanced
OR
ibmbusiness_process_managerMatch7.5.1.2advanced
OR
ibmbusiness_process_managerMatch8.0.0.0advanced
OR
ibmbusiness_process_managerMatch8.0.1.0advanced
OR
ibmbusiness_process_managerMatch8.0.1.1advanced
OR
ibmbusiness_process_managerMatch8.0.1.2advanced
OR
ibmbusiness_process_managerMatch8.0.1.3advanced
OR
ibmbusiness_process_managerMatch8.5.0.0advanced
OR
ibmbusiness_process_managerMatch8.5.0.1advanced
OR
ibmbusiness_process_managerMatch8.5.0.2advanced
OR
ibmbusiness_process_managerMatch8.5.5.0advanced
OR
ibmbusiness_process_managerMatch8.5.6.0advanced
OR
ibmbusiness_process_managerMatch8.5.6.1advanced
OR
ibmbusiness_process_managerMatch8.5.6.2advanced
OR
ibmbusiness_process_managerMatch8.5.7.0advanced
OR
ibmbusiness_process_managerMatch8.5.7.0cf201606advanced
OR
ibmbusiness_process_managerMatch8.5.7.0cf201609advanced
OR
ibmbusiness_process_managerMatch8.5.7.0cf201612advanced
OR
ibmbusiness_process_managerMatch8.5.7.0cf201703advanced
OR
ibmbusiness_process_managerMatch8.5.7.0cf201706advanced
Node
ibmwebsphere_enterprise_service_busMatch7.0.0.0
OR
ibmwebsphere_enterprise_service_busMatch7.0.0.0registry
OR
ibmwebsphere_enterprise_service_busMatch7.0.0.1
OR
ibmwebsphere_enterprise_service_busMatch7.0.0.1registry
OR
ibmwebsphere_enterprise_service_busMatch7.0.0.2
OR
ibmwebsphere_enterprise_service_busMatch7.0.0.2registry
OR
ibmwebsphere_enterprise_service_busMatch7.0.0.3
OR
ibmwebsphere_enterprise_service_busMatch7.0.0.3registry
OR
ibmwebsphere_enterprise_service_busMatch7.0.0.4
OR
ibmwebsphere_enterprise_service_busMatch7.0.0.4registry
OR
ibmwebsphere_enterprise_service_busMatch7.0.0.5
OR
ibmwebsphere_enterprise_service_busMatch7.0.0.5registry
OR
ibmwebsphere_enterprise_service_busMatch7.5.0.0
OR
ibmwebsphere_enterprise_service_busMatch7.5.0.0registry
OR
ibmwebsphere_enterprise_service_busMatch7.5.0.1
OR
ibmwebsphere_enterprise_service_busMatch7.5.0.1registry
OR
ibmwebsphere_enterprise_service_busMatch7.5.1.0
OR
ibmwebsphere_enterprise_service_busMatch7.5.1.0registry
OR
ibmwebsphere_enterprise_service_busMatch7.5.1.1
OR
ibmwebsphere_enterprise_service_busMatch7.5.1.1registry
OR
ibmwebsphere_enterprise_service_busMatch7.5.1.2
OR
ibmwebsphere_enterprise_service_busMatch7.5.1.2registry
Node
ibmwebsphere_process_serverMatch7.0
OR
ibmwebsphere_process_serverMatch7.0.0.1
OR
ibmwebsphere_process_serverMatch7.0.0.2
OR
ibmwebsphere_process_serverMatch7.0.0.3
OR
ibmwebsphere_process_serverMatch7.0.0.4
OR
ibmwebsphere_process_serverMatch7.0.0.5
Node
ibmbusiness_process_manager_enterprise_service_busMatch8.6.0.0
Node
ibmbusiness_process_managerMatch7.5.0.0express
OR
ibmbusiness_process_managerMatch7.5.0.1express
OR
ibmbusiness_process_managerMatch7.5.1.0express
OR
ibmbusiness_process_managerMatch7.5.1.1express
OR
ibmbusiness_process_managerMatch7.5.1.2express
OR
ibmbusiness_process_managerMatch8.0.0.0express
OR
ibmbusiness_process_managerMatch8.0.1.0express
OR
ibmbusiness_process_managerMatch8.0.1.1express
OR
ibmbusiness_process_managerMatch8.0.1.2express
OR
ibmbusiness_process_managerMatch8.0.1.3express
OR
ibmbusiness_process_managerMatch8.5.0.0express
OR
ibmbusiness_process_managerMatch8.5.0.1express
OR
ibmbusiness_process_managerMatch8.5.0.2express
OR
ibmbusiness_process_managerMatch8.5.5.0express
OR
ibmbusiness_process_managerMatch8.5.6.0express
OR
ibmbusiness_process_managerMatch8.5.6.1express
OR
ibmbusiness_process_managerMatch8.5.6.2express
OR
ibmbusiness_process_managerMatch8.5.7.0express
OR
ibmbusiness_process_managerMatch8.5.7.0cf201606express
OR
ibmbusiness_process_managerMatch8.5.7.0cf201609express
OR
ibmbusiness_process_managerMatch8.5.7.0cf201612express
OR
ibmbusiness_process_managerMatch8.5.7.0cf201703express
OR
ibmbusiness_process_managerMatch8.5.7.0cf201706express
OR
ibmbusiness_process_managerMatch8.6.0.0express
OR
ibmbusiness_process_managerMatch8.6.0.0cf201712express
Node
ibmbusiness_process_managerMatch7.5.0.0standard
OR
ibmbusiness_process_managerMatch7.5.0.1standard
OR
ibmbusiness_process_managerMatch7.5.1.0standard
OR
ibmbusiness_process_managerMatch7.5.1.1standard
OR
ibmbusiness_process_managerMatch7.5.1.2standard
OR
ibmbusiness_process_managerMatch8.0.0.0standard
OR
ibmbusiness_process_managerMatch8.0.1.0standard
OR
ibmbusiness_process_managerMatch8.0.1.1standard
OR
ibmbusiness_process_managerMatch8.0.1.2standard
OR
ibmbusiness_process_managerMatch8.0.1.3standard
OR
ibmbusiness_process_managerMatch8.5.0.0standard
OR
ibmbusiness_process_managerMatch8.5.0.1standard
OR
ibmbusiness_process_managerMatch8.5.0.2standard
OR
ibmbusiness_process_managerMatch8.5.5.0standard
OR
ibmbusiness_process_managerMatch8.5.6.0standard
OR
ibmbusiness_process_managerMatch8.5.6.1standard
OR
ibmbusiness_process_managerMatch8.5.6.2standard
OR
ibmbusiness_process_managerMatch8.5.7.0standard
OR
ibmbusiness_process_managerMatch8.5.7.0cf201606standard
OR
ibmbusiness_process_managerMatch8.5.7.0cf201609standard
OR
ibmbusiness_process_managerMatch8.5.7.0cf201612standard
OR
ibmbusiness_process_managerMatch8.5.7.0cf201703standard
OR
ibmbusiness_process_managerMatch8.5.7.0cf201706standard
VendorProductVersionCPE
ibmbusiness_process_manager7.5.0.0cpe:2.3:a:ibm:business_process_manager:7.5.0.0:*:*:*:advanced:*:*:*
ibmbusiness_process_manager7.5.0.1cpe:2.3:a:ibm:business_process_manager:7.5.0.1:*:*:*:advanced:*:*:*
ibmbusiness_process_manager7.5.1.0cpe:2.3:a:ibm:business_process_manager:7.5.1.0:*:*:*:advanced:*:*:*
ibmbusiness_process_manager7.5.1.1cpe:2.3:a:ibm:business_process_manager:7.5.1.1:*:*:*:advanced:*:*:*
ibmbusiness_process_manager7.5.1.2cpe:2.3:a:ibm:business_process_manager:7.5.1.2:*:*:*:advanced:*:*:*
ibmbusiness_process_manager8.0.0.0cpe:2.3:a:ibm:business_process_manager:8.0.0.0:*:*:*:advanced:*:*:*
ibmbusiness_process_manager8.0.1.0cpe:2.3:a:ibm:business_process_manager:8.0.1.0:*:*:*:advanced:*:*:*
ibmbusiness_process_manager8.0.1.1cpe:2.3:a:ibm:business_process_manager:8.0.1.1:*:*:*:advanced:*:*:*
ibmbusiness_process_manager8.0.1.2cpe:2.3:a:ibm:business_process_manager:8.0.1.2:*:*:*:advanced:*:*:*
ibmbusiness_process_manager8.0.1.3cpe:2.3:a:ibm:business_process_manager:8.0.1.3:*:*:*:advanced:*:*:*
Rows per page:
1-10 of 1001

CNA Affected

[
  {
    "product": "Business Process Manager",
    "vendor": "IBM",
    "versions": [
      {
        "status": "affected",
        "version": "8.6"
      },
      {
        "status": "affected",
        "version": "8.6.0.CF201712"
      }
    ]
  }
]

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

AI Score

5.2

Confidence

High

EPSS

0.001

Percentile

35.1%

Related for CVE-2018-1384