An App Connect Enterprise flow that uses the Jira connector may be vulnerable to a spoofing attack if the flow can be made to target a specially-crafted URL
CVEID:CVE-2020-26291
**DESCRIPTION:**Node.js urijs module could allow a remote attacker to conduct spoofing attacks, caused by improper input validation. By persuading a victim to visit a specially-crafted URL, an attacker could exploit this vulnerability using a backslash (\) character followed by an at (@) character to spoof the Hostname.
CVSS Base score: 6.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/194370 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N)
Affected Product(s) | Version(s) |
---|---|
App Connect Enterprise Certified Container | 1.0 with Operator |
App Connect Enterprise Certified Container | 1.1 with Operator |
App Connect Enterprise Certified Container 1.0 CD
Upgrade to App Connect Enterprise Certified Container to Operator version 1.2.0 (available in CASE 1.2.0) or higher, and ensure that all components are at 11.0.0.11-r1 or higher.
App Connect Enterprise Certified Container 1.1 LTS
Upgrade to App Connect Enterprise Certified Container Operator version 1.1.1 EUS (available in CASE 1.1.1) or higher, and ensure that all components are at 11.0.0.12-r1-eus or higher.
None