CNVD-2015-02805

Vulnerability from cnvd - Published: 2015-04-29
VLAI Severity ?
Title
IBM Curam Social Program Management (SPM)跨站请求伪造漏洞(CNVD-2015-02805)
Description
IBM Curam Social Program Management(SPM)是美国IBM公司的一套社会计划管理解决方案。该方案支持终端到终端社会项目交付的过程。 IBM Curam Social Program Management (SPM)存在跨站请求伪造漏洞。允许攻击者利用此漏洞劫持任意用户的身份验证请求。
Severity
Patch Name
IBM Curam Social Program Management (SPM)跨站请求伪造漏洞(CNVD-2015-02805)的补丁
Patch Description
IBM Curam Social Program Management(SPM)是美国IBM公司的一套社会计划管理解决方案。该方案支持终端到终端社会项目交付的过程。 IBM Curam Social Program Management (SPM)存在跨站请求伪造漏洞。允许攻击者利用此漏洞劫持任意用户的身份验证请求。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

目前厂商已经发布升级补丁/版本以修复这个安全问题,请用户及时下载更新: http://www-01.ibm.com/support/docview.wss?uid=swg21697726

Reference
http://www-01.ibm.com/support/docview.wss?uid=swg21697726 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6090
Impacted products
Name
['IBM Cúram Social Program Management 6.0 SP2', 'IBM Cúram Social Program Management 6.0.4', 'IBM Cúram Social Program Management 6.0.5', 'IBM Curam Social Program Management 5.2 SP6', 'IBM Curam Social Program Management 6.0.3']
Show details on source website

{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2014-6090"
    }
  },
  "description": "IBM Curam Social Program Management\uff08SPM\uff09\u662f\u7f8e\u56fdIBM\u516c\u53f8\u7684\u4e00\u5957\u793e\u4f1a\u8ba1\u5212\u7ba1\u7406\u89e3\u51b3\u65b9\u6848\u3002\u8be5\u65b9\u6848\u652f\u6301\u7ec8\u7aef\u5230\u7ec8\u7aef\u793e\u4f1a\u9879\u76ee\u4ea4\u4ed8\u7684\u8fc7\u7a0b\u3002\r\n\r\nIBM Curam Social Program Management (SPM)\u5b58\u5728\u8de8\u7ad9\u8bf7\u6c42\u4f2a\u9020\u6f0f\u6d1e\u3002\u5141\u8bb8\u653b\u51fb\u8005\u5229\u7528\u6b64\u6f0f\u6d1e\u52ab\u6301\u4efb\u610f\u7528\u6237\u7684\u8eab\u4efd\u9a8c\u8bc1\u8bf7\u6c42\u3002",
  "discovererName": "IBM",
  "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u5347\u7ea7\u8865\u4e01/\u7248\u672c\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u7528\u6237\u53ca\u65f6\u4e0b\u8f7d\u66f4\u65b0\uff1a\r\nhttp://www-01.ibm.com/support/docview.wss?uid=swg21697726",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2015-02805",
  "openTime": "2015-04-29",
  "patchDescription": "IBM Curam Social Program Management\uff08SPM\uff09\u662f\u7f8e\u56fdIBM\u516c\u53f8\u7684\u4e00\u5957\u793e\u4f1a\u8ba1\u5212\u7ba1\u7406\u89e3\u51b3\u65b9\u6848\u3002\u8be5\u65b9\u6848\u652f\u6301\u7ec8\u7aef\u5230\u7ec8\u7aef\u793e\u4f1a\u9879\u76ee\u4ea4\u4ed8\u7684\u8fc7\u7a0b\u3002\r\n\r\nIBM Curam Social Program Management (SPM)\u5b58\u5728\u8de8\u7ad9\u8bf7\u6c42\u4f2a\u9020\u6f0f\u6d1e\u3002\u5141\u8bb8\u653b\u51fb\u8005\u5229\u7528\u6b64\u6f0f\u6d1e\u52ab\u6301\u4efb\u610f\u7528\u6237\u7684\u8eab\u4efd\u9a8c\u8bc1\u8bf7\u6c42\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "IBM Curam Social Program Management (SPM)\u8de8\u7ad9\u8bf7\u6c42\u4f2a\u9020\u6f0f\u6d1e\uff08CNVD-2015-02805\uff09\u7684\u8865\u4e01",
  "products": {
    "product": [
      "IBM C\u00faram Social Program Management 6.0 SP2",
      "IBM C\u00faram Social Program Management 6.0.4",
      "IBM C\u00faram Social Program Management 6.0.5",
      "IBM Curam Social Program Management 5.2 SP6",
      "IBM Curam Social Program Management 6.0.3"
    ]
  },
  "referenceLink": "http://www-01.ibm.com/support/docview.wss?uid=swg21697726\r\nhttps://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6090",
  "serverity": "\u4f4e",
  "submitTime": "2015-04-28",
  "title": "IBM Curam Social Program Management (SPM)\u8de8\u7ad9\u8bf7\u6c42\u4f2a\u9020\u6f0f\u6d1e\uff08CNVD-2015-02805\uff09"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…