CNVD-2015-04189
Vulnerability from cnvd - Published: 2015-07-03
VLAI Severity ?
Title
IBM Rational Test Workbench和Rational Test Virtualization Server验证绕过漏洞
Description
IBM Rational Test Workbench和Rational Test Virtualization Server都是美国IBM公司的用于创建、修改和部署应用程序并对其提供测试功能(功能测试、回归测试、负载测试等)的软件。前者用于企业应用程序;后者用于虚拟应用程序。Rational Test Control Panel是其中的一个为虚拟化服务提供中央存储库的Web应用程序。
IBM Rational Test Workbench和Rational Test Virtualization Server的Rational Test Control Panel中存在安全漏洞,该漏洞源于程序使用MD5算法计算用户密码的哈希值。远程攻击者可利用该漏洞绕过身份验证。
Severity
中
Patch Name
IBM Rational Test Workbench和Rational Test Virtualization Server验证绕过漏洞的补丁
Patch Description
IBM Rational Test Workbench和Rational Test Virtualization Server都是美国IBM公司的用于创建、修改和部署应用程序并对其提供测试功能(功能测试、回归测试、负载测试等)的软件。前者用于企业应用程序;后者用于虚拟应用程序。Rational Test Control Panel是其中的一个为虚拟化服务提供中央存储库的Web应用程序。IBM Rational Test Workbench和Rational Test Virtualization Server的Rational Test Control Panel中存在安全漏洞,该漏洞源于程序使用MD5算法计算用户密码的哈希值。远程攻击者可利用该漏洞绕过身份验证。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
用户可参考如下厂商提供的安全公告获取补丁以修复该漏洞: http://www-01.ibm.com/support/docview.wss?uid=swg21959298
Reference
http://www-01.ibm.com/support/docview.wss?uid=swg21959298
Impacted products
| Name | ['IBM Rational Test Workbench and Rational Test Virtualization Server 8.0.0.x(<8.0.0.5)', 'IBM Rational Test Workbench and Rational Test Virtualization Server 8.0.1.x(<8.0.1.6)', 'IBM Rational Test Workbench and Rational Test Virtualization Server 8.5.0.x(<8.5.0.4)', 'IBM Rational Test Workbench and Rational Test Virtualization Server 8.5.1.x(<8.5.1.5)', 'IBM Rational Test Workbench and Rational Test Virtualization Server 8.6.0.x(<8.6.0.4)', 'IBM Rational Test Workbench and Rational Test Virtualization Server 8.7.0.x(<8.7.0.2)'] |
|---|
{
"bids": {
"bid": {
"bidNumber": "75307"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2015-1913"
}
},
"description": "IBM Rational Test Workbench\u548cRational Test Virtualization Server\u90fd\u662f\u7f8e\u56fdIBM\u516c\u53f8\u7684\u7528\u4e8e\u521b\u5efa\u3001\u4fee\u6539\u548c\u90e8\u7f72\u5e94\u7528\u7a0b\u5e8f\u5e76\u5bf9\u5176\u63d0\u4f9b\u6d4b\u8bd5\u529f\u80fd\uff08\u529f\u80fd\u6d4b\u8bd5\u3001\u56de\u5f52\u6d4b\u8bd5\u3001\u8d1f\u8f7d\u6d4b\u8bd5\u7b49\uff09\u7684\u8f6f\u4ef6\u3002\u524d\u8005\u7528\u4e8e\u4f01\u4e1a\u5e94\u7528\u7a0b\u5e8f\uff1b\u540e\u8005\u7528\u4e8e\u865a\u62df\u5e94\u7528\u7a0b\u5e8f\u3002Rational Test Control Panel\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u4e3a\u865a\u62df\u5316\u670d\u52a1\u63d0\u4f9b\u4e2d\u592e\u5b58\u50a8\u5e93\u7684Web\u5e94\u7528\u7a0b\u5e8f\u3002\r\n\r\nIBM Rational Test Workbench\u548cRational Test Virtualization Server\u7684Rational Test Control Panel\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u4f7f\u7528MD5\u7b97\u6cd5\u8ba1\u7b97\u7528\u6237\u5bc6\u7801\u7684\u54c8\u5e0c\u503c\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u7ed5\u8fc7\u8eab\u4efd\u9a8c\u8bc1\u3002",
"discovererName": "IBM",
"formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u5382\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u516c\u544a\u83b7\u53d6\u8865\u4e01\u4ee5\u4fee\u590d\u8be5\u6f0f\u6d1e\uff1a\r\nhttp://www-01.ibm.com/support/docview.wss?uid=swg21959298",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2015-04189",
"openTime": "2015-07-03",
"patchDescription": "IBM Rational Test Workbench\u548cRational Test Virtualization Server\u90fd\u662f\u7f8e\u56fdIBM\u516c\u53f8\u7684\u7528\u4e8e\u521b\u5efa\u3001\u4fee\u6539\u548c\u90e8\u7f72\u5e94\u7528\u7a0b\u5e8f\u5e76\u5bf9\u5176\u63d0\u4f9b\u6d4b\u8bd5\u529f\u80fd\uff08\u529f\u80fd\u6d4b\u8bd5\u3001\u56de\u5f52\u6d4b\u8bd5\u3001\u8d1f\u8f7d\u6d4b\u8bd5\u7b49\uff09\u7684\u8f6f\u4ef6\u3002\u524d\u8005\u7528\u4e8e\u4f01\u4e1a\u5e94\u7528\u7a0b\u5e8f\uff1b\u540e\u8005\u7528\u4e8e\u865a\u62df\u5e94\u7528\u7a0b\u5e8f\u3002Rational Test Control Panel\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u4e3a\u865a\u62df\u5316\u670d\u52a1\u63d0\u4f9b\u4e2d\u592e\u5b58\u50a8\u5e93\u7684Web\u5e94\u7528\u7a0b\u5e8f\u3002IBM Rational Test Workbench\u548cRational Test Virtualization Server\u7684Rational Test Control Panel\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u4f7f\u7528MD5\u7b97\u6cd5\u8ba1\u7b97\u7528\u6237\u5bc6\u7801\u7684\u54c8\u5e0c\u503c\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u7ed5\u8fc7\u8eab\u4efd\u9a8c\u8bc1\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "IBM Rational Test Workbench\u548cRational Test Virtualization Server\u9a8c\u8bc1\u7ed5\u8fc7\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"IBM Rational Test Workbench and Rational Test Virtualization Server 8.0.0.x(\u003c8.0.0.5)",
"IBM Rational Test Workbench and Rational Test Virtualization Server 8.0.1.x(\u003c8.0.1.6)",
"IBM Rational Test Workbench and Rational Test Virtualization Server 8.5.0.x(\u003c8.5.0.4)",
"IBM Rational Test Workbench and Rational Test Virtualization Server 8.5.1.x(\u003c8.5.1.5)",
"IBM Rational Test Workbench and Rational Test Virtualization Server 8.6.0.x(\u003c8.6.0.4)",
"IBM Rational Test Workbench and Rational Test Virtualization Server 8.7.0.x(\u003c8.7.0.2)"
]
},
"referenceLink": "http://www-01.ibm.com/support/docview.wss?uid=swg21959298",
"serverity": "\u4e2d",
"submitTime": "2015-07-02",
"title": "IBM Rational Test Workbench\u548cRational Test Virtualization Server\u9a8c\u8bc1\u7ed5\u8fc7\u6f0f\u6d1e"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…