CNVD-2017-21247

Vulnerability from cnvd - Published: 2017-08-16
VLAI Severity ?
Title
IBM Sterling B2B Integrator XML外部实体注入漏洞
Description
IBM Sterling B2B Integrator和IBM Sterling File Gateway都是美国IBM公司的产品。IBM Sterling B2B Integrator是一套将不同合作伙伴社区的B2B流程、交易和关系集成到一起的软件。IBM Sterling File Gateway是一套整合了不同的文件传输方式,并可通过网络实现安全交互的文件传输软件。 IBM Sterling B2B Integrator和IBM Sterling File Gateway中存在XML外部实体注入漏洞。远程攻击者可借助特制的XML数据利用该漏洞读取任意文件。
Severity
Patch Name
IBM Sterling B2B Integrator XML外部实体注入漏洞的补丁
Patch Description
IBM Sterling B2B Integrator和IBM Sterling File Gateway都是美国IBM公司的产品。IBM Sterling B2B Integrator是一套将不同合作伙伴社区的B2B流程、交易和关系集成到一起的软件。IBM Sterling File Gateway是一套整合了不同的文件传输方式,并可通过网络实现安全交互的文件传输软件。 IBM Sterling B2B Integrator和IBM Sterling File Gateway中存在XML外部实体注入漏洞。远程攻击者可借助特制的XML数据利用该漏洞读取任意文件。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

目前厂商已发布升级补丁以修复漏洞,补丁获取链接: http://www-01.ibm.com/support/docview.wss?uid=swg21699482

Reference
https://nvd.nist.gov/vuln/detail/CVE-2015-0194
Impacted products
Name
['IBM Sterling B2B Integrator 5.1', 'IBM Sterling B2B Integrator 5.2', 'IBM Sterling File Gateway 2.1', 'IBM Sterling File Gateway 2.2']
Show details on source website

{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2015-0194"
    }
  },
  "description": "IBM Sterling B2B Integrator\u548cIBM Sterling File Gateway\u90fd\u662f\u7f8e\u56fdIBM\u516c\u53f8\u7684\u4ea7\u54c1\u3002IBM Sterling B2B Integrator\u662f\u4e00\u5957\u5c06\u4e0d\u540c\u5408\u4f5c\u4f19\u4f34\u793e\u533a\u7684B2B\u6d41\u7a0b\u3001\u4ea4\u6613\u548c\u5173\u7cfb\u96c6\u6210\u5230\u4e00\u8d77\u7684\u8f6f\u4ef6\u3002IBM Sterling File Gateway\u662f\u4e00\u5957\u6574\u5408\u4e86\u4e0d\u540c\u7684\u6587\u4ef6\u4f20\u8f93\u65b9\u5f0f\uff0c\u5e76\u53ef\u901a\u8fc7\u7f51\u7edc\u5b9e\u73b0\u5b89\u5168\u4ea4\u4e92\u7684\u6587\u4ef6\u4f20\u8f93\u8f6f\u4ef6\u3002\r\n\r\nIBM Sterling B2B Integrator\u548cIBM Sterling File Gateway\u4e2d\u5b58\u5728XML\u5916\u90e8\u5b9e\u4f53\u6ce8\u5165\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u501f\u52a9\u7279\u5236\u7684XML\u6570\u636e\u5229\u7528\u8be5\u6f0f\u6d1e\u8bfb\u53d6\u4efb\u610f\u6587\u4ef6\u3002",
  "discovererName": "IBM",
  "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttp://www-01.ibm.com/support/docview.wss?uid=swg21699482",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2017-21247",
  "openTime": "2017-08-16",
  "patchDescription": "IBM Sterling B2B Integrator\u548cIBM Sterling File Gateway\u90fd\u662f\u7f8e\u56fdIBM\u516c\u53f8\u7684\u4ea7\u54c1\u3002IBM Sterling B2B Integrator\u662f\u4e00\u5957\u5c06\u4e0d\u540c\u5408\u4f5c\u4f19\u4f34\u793e\u533a\u7684B2B\u6d41\u7a0b\u3001\u4ea4\u6613\u548c\u5173\u7cfb\u96c6\u6210\u5230\u4e00\u8d77\u7684\u8f6f\u4ef6\u3002IBM Sterling File Gateway\u662f\u4e00\u5957\u6574\u5408\u4e86\u4e0d\u540c\u7684\u6587\u4ef6\u4f20\u8f93\u65b9\u5f0f\uff0c\u5e76\u53ef\u901a\u8fc7\u7f51\u7edc\u5b9e\u73b0\u5b89\u5168\u4ea4\u4e92\u7684\u6587\u4ef6\u4f20\u8f93\u8f6f\u4ef6\u3002\r\n\r\nIBM Sterling B2B Integrator\u548cIBM Sterling File Gateway\u4e2d\u5b58\u5728XML\u5916\u90e8\u5b9e\u4f53\u6ce8\u5165\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u501f\u52a9\u7279\u5236\u7684XML\u6570\u636e\u5229\u7528\u8be5\u6f0f\u6d1e\u8bfb\u53d6\u4efb\u610f\u6587\u4ef6\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "IBM Sterling B2B Integrator XML\u5916\u90e8\u5b9e\u4f53\u6ce8\u5165\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "IBM Sterling B2B Integrator 5.1",
      "IBM Sterling B2B Integrator 5.2",
      "IBM Sterling File Gateway  2.1",
      "IBM Sterling File Gateway  2.2"
    ]
  },
  "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2015-0194",
  "serverity": "\u4e2d",
  "submitTime": "2017-08-03",
  "title": "IBM Sterling B2B Integrator XML\u5916\u90e8\u5b9e\u4f53\u6ce8\u5165\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…