IBM Tivoli Application Dependency Discovery Manager 7.2.1 cmd/Welcome.do config
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 6.0 | $0-$5k | 0.00 |
Summary
A vulnerability was found in IBM Tivoli Application Dependency Discovery Manager 7.2.1 and classified as problematic. Affected by this issue is some unknown functionality of the file cmd/Welcome.do. Executing a manipulation can lead to config. This vulnerability is registered as CVE-2012-5770. It is possible to launch the attack remotely. Furthermore, an exploit is available. A patch should be applied to remediate this issue.
Details
A vulnerability has been found in IBM Tivoli Application Dependency Discovery Manager 7.2.1 (Directory Service Software) and classified as critical. This vulnerability affects an unknown code of the file cmd/Welcome.do. The manipulation with an unknown input leads to a config vulnerability. The CWE definition for the vulnerability is CWE-16. As an impact it is known to affect confidentiality, integrity, and availability. CVE summarizes:
The SSL configuration in IBM Tivoli Application Dependency Discovery Manager (TADDM) 7.2.x before 7.2.1.4 supports the MD5 hash algorithm, which makes it easier for man-in-the-middle attackers to spoof servers and decrypt network traffic via a brute-force attack.
The weakness was published 02/08/2013 as swg1IV32341 as confirmed bulletin (Website). The advisory is available at ibm.com. This vulnerability was named CVE-2012-5770 since 11/02/2012. The attack can be initiated remotely. No form of authentication is required for a successful exploitation. Successful exploitation requires user interaction by the victim. Technical details and also a exploit are known. This vulnerability is assigned to T1592.004 by the MITRE ATT&CK project.
It is declared as highly functional.
Applying the patch 7.2.1-TIV-ITADDM-FP0004 is able to eliminate this problem. A possible mitigation has been published immediately after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at X-Force (80494), SecurityFocus (BID 57878†), OSVDB (90081†) and Secunia (SA52128†). Similar entries are available at VDB-7689, VDB-7691, VDB-7692 and VDB-7902. Once again VulDB remains the best source for vulnerability data.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.ibm.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 6.3VulDB Meta Temp Score: 6.0
VulDB Base Score: 6.3
VulDB Temp Score: 6.0
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: ConfigCWE: CWE-16
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Highly functional
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Patch: 7.2.1-TIV-ITADDM-FP0004
Timeline
11/02/2012 🔍02/08/2013 🔍
02/08/2013 🔍
02/08/2013 🔍
02/18/2013 🔍
03/06/2013 🔍
05/03/2018 🔍
Sources
Vendor: ibm.comAdvisory: swg1IV32341
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2012-5770 (🔍)
GCVE (CVE): GCVE-0-2012-5770
GCVE (VulDB): GCVE-100-7690
X-Force: 80494 - IBM Tivoli Application Dependency Discovery Manager Welcome.do cross-site scripting, Low Risk
SecurityFocus: 57878
Secunia: 52128 - IBM Tivoli Application Dependency Discovery Manager Web UI Portal Multiple Vulnerabilities, Less Critical
OSVDB: 90081
scip Labs: https://www.scip.ch/en/?labs.20161013
See also: 🔍
Entry
Created: 02/18/2013 10:29Updated: 05/03/2018 12:24
Changes: 02/18/2013 10:29 (62), 05/03/2018 12:24 (6)
Complete: 🔍
Committer: olku
Cache ID: 216:9D2:103
No comments yet. Languages: en.
Please log in to comment.