SB2018121819 - Multiple vulnerabilities in IBM Security Guardium
Published: December 18, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Cross-site scripting (CVE-ID: CVE-2018-1889)
The disclosed vulnerability allows a remote authenticated attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
2) Cross-site scripting (CVE-ID: CVE-2018-1891)
The disclosed vulnerability allows a remote authenticated attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
3) Information disclosure (CVE-ID: CVE-2017-1272)
The vulnerability allows a remote attacker to obtain potentially sensitive information.
The vulnerability exists due to the application stores sensitive information in URL parameters. A remote attacker can gain access to potentially sensitive information if unauthorized parties have access to the URLs via server logs, referrer header or browser history.
4) Information disclosure (CVE-ID: CVE-2017-1597)
The vulnerability allows a remote attacker to obtain potentially sensitive information.
The vulnerability exists due to the application does not require that users should have strong passwords by default. A remote attacker can gain access to potentially sensitive information and compromise user accounts.
5) Spoofing attack (CVE-ID: CVE-2017-1265)
The vulnerability allows a remote attacker to conduct spoofing attack.
The vulnerability exists due to the application does not validate, or incorrectly validates, a certificate. A remote attacker can spoof a trusted entity by using a man-in-the-middle (MITM) techniques.
Remediation
Install update from vendor's website.