CERTA-2011-AVI-527

Vulnerability from certfr_avis - Published: 2011-09-20 - Updated: 2011-09-20

Plusieurs vulnérabilités ont été corrigées dans IBM WebSphere et permettent à un utilisateur malintentionné de réaliser une injection de code indirecte à distance.

Description

Plusieurs vulnérabilités ont été corrigées dans IBM WebSphere concernant DOJO. Elles permettent à un utilisateur malintentionné de réaliser une injection de code indirecte à distance ou de rediriger les autres utilisateurs vers une page Web arbitraire au moyen d'une URL spécialement conçue.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
IBM WebSphere IBM WebSphere Commerce 7, versions antérieures à la version 7 FEP 3.
IBM WebSphere IBM WebSphere Commerce 6 ;
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "IBM WebSphere Commerce 7, versions ant\u00e9rieures \u00e0 la version 7 FEP 3.",
      "product": {
        "name": "WebSphere",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "IBM WebSphere Commerce 6 ;",
      "product": {
        "name": "WebSphere",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans IBM WebSphere concernant\nDOJO. Elles permettent \u00e0 un utilisateur malintentionn\u00e9 de r\u00e9aliser une\ninjection de code indirecte \u00e0 distance ou de rediriger les autres\nutilisateurs vers une page Web arbitraire au moyen d\u0027une URL\nsp\u00e9cialement con\u00e7ue.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [],
  "initial_release_date": "2011-09-20T00:00:00",
  "last_revision_date": "2011-09-20T00:00:00",
  "links": [],
  "reference": "CERTA-2011-AVI-527",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2011-09-20T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Injection de code indirecte \u00e0 distance"
    }
  ],
  "summary": "Plusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans IBM WebSphere et\npermettent \u00e0 un utilisateur malintentionn\u00e9 de r\u00e9aliser une injection de\ncode indirecte \u00e0 distance.\n",
  "title": "Vuln\u00e9rabilit\u00e9s dans IBM WebSphere Commerce Enterprise",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM swg1JR40578 du 16 septembre 2011",
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1JR40578"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…