Code execution in IBM Security Identity Management product



Published: 2022-10-12
Risk High
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2018-15494
CWE-ID CWE-74
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
IBM Security Identity Manager
Server applications / Directory software, identity management

Vendor IBM Corporation

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) Improper Neutralization of Special Elements in Output Used by a Downstream Component

EUVDB-ID: #VU36773

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-15494

CWE-ID: CWE-74 - Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

In Dojo Toolkit before 1.14, there is unescaped string injection in dojox/Grid/DataGrid.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Security Identity Manager: before 6.0.2 FP0005

External links

http://www.ibm.com/blogs/psirt/security-bulletin-a-security-vulnerability-found-in-dojo-toolkit-which-is-shipped-with-ibm-security-identity-management-product-cve-2018-15494/
http://www.ibm.com/support/pages/node/6828567


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###