CERTA-2008-AVI-533
Vulnerability from certfr_avis - Published: 2008-10-30 - Updated: 2008-10-30
Plusieurs vulnérabilités ont été corrigées. Elles permettent, entre autre, d'accéder à des données confidentielles, de faire des attaques en cross-site scripting et des injections de code SQL.
Description
Plusieurs vulnérabilités ont été corrigées. Elles concernent la mauvaise vérification de données entrées, ce qui permet l'injection de code SQL et les attaques en cross-site scripting. Elles concernent aussi des données de connexions confidentielles copiées dans les journaux d'événéments.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Les versions antérieures à IBM Lotus Connections 2.0.1.
Impacted products
| Vendor | Product | Description |
|---|
References
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eLes versions ant\u00e9rieures \u00e0 IBM Lotus Connections 2.0.1.\u003c/p\u003e",
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es. Elles concernent la mauvaise\nv\u00e9rification de donn\u00e9es entr\u00e9es, ce qui permet l\u0027injection de code SQL\net les attaques en cross-site scripting. Elles concernent aussi des\ndonn\u00e9es de connexions confidentielles copi\u00e9es dans les journaux\nd\u0027\u00e9v\u00e9n\u00e9ments.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [],
"initial_release_date": "2008-10-30T00:00:00",
"last_revision_date": "2008-10-30T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 IBM swg27014008 du 29 octobre 2008 :",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg27014008"
}
],
"reference": "CERTA-2008-AVI-533",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2008-10-30T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es. Elles permettent, entre\nautre, d\u0027acc\u00e9der \u00e0 des donn\u00e9es confidentielles, de faire des attaques en\n\u003cspan class=\"textit\"\u003ecross-site scripting\u003c/span\u003e et des injections de\ncode SQL.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM Lotus Connections",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7014008 du 29 octobre 2008",
"url": null
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…