CVE编号
CVE-2018-1905利用情况
暂无补丁情况
N/A披露时间
2018-11-27漏洞描述
IBM WebSphere Application Server 9.0.0.0到9.0.0.9在处理XML数据时容易受到XML外部实体注入(XXE)攻击。远程攻击者可以利用此漏洞暴露敏感信息或占用内存资源。 IBM X-Force ID:152534。<br>解决建议
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:https://www-01.ibm.com/support/docview.wss?uid=ibm10738721
参考链接 |
|
---|---|
http://www.securityfocus.com/bid/106030 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/152534 | |
https://www.ibm.com/support/docview.wss?uid=ibm10738721 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | ibm | websphere_application_server | * |
From (including) 9.0.0.0 |
Up to (including) 9.0.0.9 |
||||
运行在以下环境 | |||||||||
系统 | alibaba_cloud_linux_2.1903 | poppler | * |
Up to (excluding) 0.26.5-38.1.al7 |
|||||
运行在以下环境 | |||||||||
系统 | amazon linux_2 | poppler | * |
Up to (excluding) 0.26.5-38.amzn2 |
|||||
运行在以下环境 | |||||||||
系统 | amazon linux_AMI | poppler | * |
Up to (excluding) 0.26.5-38.19.amzn1 |
|||||
运行在以下环境 | |||||||||
系统 | amazon_2 | poppler | * |
Up to (excluding) 0.26.5-38.amzn2 |
|||||
运行在以下环境 | |||||||||
系统 | amazon_AMI | poppler | * |
Up to (excluding) 0.26.5-38.19.amzn1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_10 | poppler | * |
Up to (excluding) 0.71.0-5 |
|||||
运行在以下环境 | |||||||||
系统 | debian_11 | poppler | * |
Up to (excluding) 20.09.0-2 |
|||||
运行在以下环境 | |||||||||
系统 | debian_8 | poppler | * |
Up to (excluding) 0.26.5-2+deb8u2 |
|||||
运行在以下环境 | |||||||||
系统 | debian_9 | poppler | * |
Up to (excluding) 1.4.45-1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_sid | poppler | * |
Up to (excluding) 20.09.0-2 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_28 | poppler | * |
Up to (excluding) 0.62.0-10.fc28 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_29 | poppler | * |
Up to (excluding) 0.67.0-6.fc29 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.0 | poppler | * |
Up to (excluding) 1.4.54-lp151.3.3.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.1 | poppler | * |
Up to (excluding) 1.4.54-lp151.3.3.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.3 | poppler | * |
Up to (excluding) 0.62.0-4.6.1 |
|||||
运行在以下环境 | |||||||||
系统 | oracle linux_7 | poppler | * |
Up to (excluding) 3.28.2-8.el7 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_7 | poppler | * |
Up to (excluding) 4.10.5-7.el7 |
|||||
运行在以下环境 | |||||||||
系统 | redhat_7 | poppler | * |
Up to (excluding) 0:0.26.5-38.el7 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_14.04_lts | poppler | * |
Up to (excluding) 0.24.5-2ubuntu4.13 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04_lts | poppler | * |
Up to (excluding) 0.41.0-0ubuntu1.9 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04_lts | poppler | * |
Up to (excluding) 0.62.0-2ubuntu2.4 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.10 | poppler | * |
Up to (excluding) 0.68.0-0ubuntu1.2 |
|||||
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 低
- 影响范围 未更改
- 用户交互 无
- 可用性 低
- 保密性 高
- 完整性 无
还没有评论,来说两句吧...