CVE编号
CVE-2018-1653利用情况
暂无补丁情况
N/A披露时间
2018-12-14漏洞描述
IBM Security Access Manager是美国IBM公司的一款应用于信息安全管理的产品。该产品通过面向Web、移动和云计算的集成设备来实现访问管理控制。 IBM Security Access Manager 9.0.1.0版本至9.0.5.0版本中存在跨站脚本漏洞。远程攻击者可利用该漏洞向Web UI中注入任意的JavaScript代码,泄露凭证。解决建议
厂商已发布了漏洞修复程序,请及时关注更新:https://www-01.ibm.com/support/docview.wss?uid=ibm10787785
参考链接 |
|
---|---|
http://www.ibm.com/support/docview.wss?uid=ibm10787785 | |
http://www.securityfocus.com/bid/106272 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/144726 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | ibm | security_access_manager | * |
From (including) 9.0.1.0 |
Up to (including) 9.0.5.0 |
||||
运行在以下环境 | |||||||||
系统 | amazon linux_2 | ghostscript | * |
Up to (excluding) 9.06-8.amzn2.0.5 |
|||||
运行在以下环境 | |||||||||
系统 | amazon_2 | ghostscript | * |
Up to (excluding) 9.06-8.amzn2.0.5 |
|||||
运行在以下环境 | |||||||||
系统 | centos_7 | ghostscript | * |
Up to (excluding) 9.07-31.el7_6.1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_8 | ghostscript | * |
Up to (excluding) 9.06~dfsg-2+deb8u5 |
|||||
运行在以下环境 | |||||||||
系统 | debian_9 | ghostscript | * |
Up to (excluding) 9.20~dfsg-3.2+deb9u4 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_27 | ghostscript | * |
Up to (excluding) 9.22-5.fc27 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_28 | ghostscript | * |
Up to (excluding) 9.24-1.fc28 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_29 | ghostscript | * |
Up to (excluding) 9.24-1.fc29 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.0 | ghostscript | * |
Up to (excluding) 9.25-lp150.2.6.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_42.3 | ghostscript | * |
Up to (excluding) 9.25-14.9.1 |
|||||
运行在以下环境 | |||||||||
系统 | oracle linux_7 | ghostscript | * |
Up to (excluding) 9.25-2.el7 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_7 | ghostscript | * |
Up to (excluding) 9.07-31.el7_6.1 |
|||||
运行在以下环境 | |||||||||
系统 | redhat_7 | ghostscript | * |
Up to (excluding) 0:9.07-31.el7_6.1 |
|||||
运行在以下环境 | |||||||||
系统 | sles_12 | ghostscript | * |
Up to (excluding) 9.25-23.13 |
|||||
运行在以下环境 | |||||||||
系统 | sles_12_SP3 | ghostscript | * |
Up to (excluding) 9.25-23.13.1 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12_SP3 | ghostscript | * |
Up to (excluding) 9.25-23.13.1 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_14.04_lts | ghostscript | * |
Up to (excluding) 9.10~dfsg-0ubuntu10.13 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04_lts | ghostscript | * |
Up to (excluding) 9.18~dfsg~0-0ubuntu2.9 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04_lts | ghostscript | * |
Up to (excluding) 9.22~dfsg+1-0ubuntu1.2 |
|||||
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 低
- 影响范围 已更改
- 用户交互 需要
- 可用性 无
- 保密性 低
- 完整性 低
还没有评论,来说两句吧...