IBM WebSphere Service Registry/Repository up to 7.5.0.1 cross-site request forgery
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
5.3 | $0-$5k | 0.00 |
A vulnerability was found in IBM WebSphere Service Registry and Repository up to 7.5.0.1 (Application Server Software). It has been declared as problematic. This vulnerability affects some unknown processing. The manipulation with an unknown input leads to a cross-site request forgery vulnerability. The CWE definition for the vulnerability is CWE-352. The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request. As an impact it is known to affect confidentiality, integrity, and availability. CVE summarizes:
Multiple cross-site request forgery (CSRF) vulnerabilities in IBM WebSphere Service Registry and Repository (WSRR) 6.3.x before 6.3.0.5, 7.0.x before 7.0.0.5, 7.5.x before 7.5.0.3, and 8.0.x before 8.0.0.2 allow remote authenticated users to hijack the authentication of unspecified victims via unknown vectors.
The weakness was released 12/24/2014 (Website). The advisory is available at xforce.iss.net. This vulnerability was named CVE-2014-6187 since 09/02/2014. The attack can be initiated remotely. Required for exploitation is a single authentication. Successful exploitation requires user interaction by the victim. The technical details are unknown and an exploit is not available.
The vulnerability scanner Nessus provides a plugin with the ID 80855 (IBM WebSphere Service Registry and Repository 6.3 < 6.3.0.5 Multiple Vulnerabilities), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Windows.
Upgrading to version 7.5.0.2 eliminates this vulnerability.
The vulnerability is also documented in the databases at X-Force (98553) and Tenable (80855). Entries connected to this vulnerability are available at 73367, 73365, 73358 and 73357.
Product
Type
Vendor
Name
Version
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.5VulDB Meta Temp Score: 5.3
VulDB Base Score: 5.5
VulDB Temp Score: 5.3
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Cross-site request forgeryCWE: CWE-352 / CWE-862 / CWE-863
ATT&CK: Unknown
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Nessus ID: 80855
Nessus Name: IBM WebSphere Service Registry and Repository 6.3 < 6.3.0.5 Multiple Vulnerabilities
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: WebSphere Service Registry/Repository 7.5.0.2
Timeline
09/02/2014 🔍12/19/2014 🔍
12/24/2014 🔍
12/24/2014 🔍
01/07/2015 🔍
02/04/2015 🔍
03/27/2015 🔍
04/09/2022 🔍
Sources
Vendor: ibm.comAdvisory: xforce.iss.net
Status: Not defined
Confirmation: 🔍
CVE: CVE-2014-6187 (🔍)
X-Force: 98553
Vulnerability Center: 48453 - IBM WebSphere Service Registry and Repository (WSRR) Remote CSRF, Low
SecurityFocus: 71906 - IBM WebSphere Service Registry and Repository Multiple Cross Site Request Forgery Vulnerabilities
See also: 🔍
Entry
Created: 03/27/2015 14:56Updated: 04/09/2022 16:22
Changes: 03/27/2015 14:56 (61), 06/19/2017 08:26 (4), 04/09/2022 16:22 (3)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.