CERTA-2010-AVI-279
Vulnerability from certfr_avis - Published: 2010-06-22 - Updated: 2010-06-22
Une vulnérabilité dans IBM WebSphere ILOG JRules permet à une personne malintentionnée d'effectuer une injection de code indirecte.
Description
Une erreur dans le traitement de certains paramètres dans une URL appartenant à IBM WebSphere ILOG JRules permet à une personne malintentionnée d'effectuer une injection de code indirecte par l'intermédiaire des pages retournées.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
IBM WebSphere ILOG JRules versions 6.x.
Impacted products
| Vendor | Product | Description |
|---|
References
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eIBM WebSphere ILOG JRules versions 6.x.\u003c/P\u003e",
"content": "## Description\n\nUne erreur dans le traitement de certains param\u00e8tres dans une URL\nappartenant \u00e0 IBM WebSphere ILOG JRules permet \u00e0 une personne\nmalintentionn\u00e9e d\u0027effectuer une injection de code indirecte par\nl\u0027interm\u00e9diaire des pages retourn\u00e9es.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [],
"initial_release_date": "2010-06-22T00:00:00",
"last_revision_date": "2010-06-22T00:00:00",
"links": [],
"reference": "CERTA-2010-AVI-279",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2010-06-22T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 dans IBM WebSphere ILOG JRules permet \u00e0 une personne\nmalintentionn\u00e9e d\u0027effectuer une injection de code indirecte.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans IBM WebSphere ILOG JRules",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM swg1RS00133 du 21 juin 2010",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1RS00133"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…