CVE-2017-1669
Vulnerability from cvelistv5
Published
2018-01-04 17:00
Modified
2024-09-16 23:46
Severity ?
EPSS score ?
Summary
IBM Tivoli Key Lifecycle Manager 2.5, 2.6, and 2.7 stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history. IBM X-Force ID: 133636.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@us.ibm.com | http://www.ibm.com/support/docview.wss?uid=swg21997955 | Vendor Advisory | |
psirt@us.ibm.com | http://www.securityfocus.com/bid/102468 | Third Party Advisory, VDB Entry | |
psirt@us.ibm.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/133636 | VDB Entry, Vendor Advisory |
Impacted products
▼ | Vendor | Product |
---|---|---|
IBM | Security Key Lifecycle Manager |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T13:39:31.933Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg21997955" }, { "name": "102468", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/102468" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/133636" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Security Key Lifecycle Manager", "vendor": "IBM", "versions": [ { "status": "affected", "version": "2.5" }, { "status": "affected", "version": "2.6" }, { "status": "affected", "version": "2.7" } ] } ], "datePublic": "2018-01-03T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Tivoli Key Lifecycle Manager 2.5, 2.6, and 2.7 stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history. IBM X-Force ID: 133636." } ], "problemTypes": [ { "descriptions": [ { "description": "Obtain Information", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-11T10:57:01", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg21997955" }, { "name": "102468", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/102468" }, { "tags": [ "x_refsource_MISC" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/133636" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2018-01-03T00:00:00", "ID": "CVE-2017-1669", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Security Key Lifecycle Manager", "version": { "version_data": [ { "version_value": "2.5" }, { "version_value": "2.6" }, { "version_value": "2.7" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Tivoli Key Lifecycle Manager 2.5, 2.6, and 2.7 stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history. IBM X-Force ID: 133636." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Obtain Information" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.ibm.com/support/docview.wss?uid=swg21997955", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg21997955" }, { "name": "102468", "refsource": "BID", "url": "http://www.securityfocus.com/bid/102468" }, { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/133636", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/133636" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2017-1669", "datePublished": "2018-01-04T17:00:00Z", "dateReserved": "2016-11-30T00:00:00", "dateUpdated": "2024-09-16T23:46:41.616Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2017-1669\",\"sourceIdentifier\":\"psirt@us.ibm.com\",\"published\":\"2018-01-04T17:29:00.387\",\"lastModified\":\"2018-01-12T20:14:10.600\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"IBM Tivoli Key Lifecycle Manager 2.5, 2.6, and 2.7 stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history. IBM X-Force ID: 133636.\"},{\"lang\":\"es\",\"value\":\"IBM Tivoli Key Lifecycle Manager 2.5, 2.6 y 2.7 almacena informaci\u00f3n sensible en par\u00e1metros URL. Esto podr\u00eda llevar a una divulgaci\u00f3n de informaci\u00f3n si partes no autorizadas tienen acceso a las URL mediante registros del servidor, cabeceras referrer o el historial del navegador. IBM X-Force ID: 133636.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":3.7,\"baseSeverity\":\"LOW\"},\"exploitabilityScore\":2.2,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:N/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":4.3},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:security_key_lifecycle_manager:2.5.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE43784F-AEBE-4399-82C5-A339D9BCB676\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:security_key_lifecycle_manager:2.5.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E57B0BB-2994-4A47-9C32-3DA982F23071\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:security_key_lifecycle_manager:2.5.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FD5B68E-FB45-4985-96C7-6CFF3765E761\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:security_key_lifecycle_manager:2.5.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF878AE8-D016-4546-84ED-5D65E21F833B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:security_key_lifecycle_manager:2.5.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81E86F00-E597-4C98-9863-05A4BA84D0A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:security_key_lifecycle_manager:2.5.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BE7F6BA-BB8E-4249-81EE-EC8C617B48E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:security_key_lifecycle_manager:2.5.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAA52325-CC9C-481A-8140-32C86608E2B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:security_key_lifecycle_manager:2.5.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F809CA96-9F05-4E58-91D0-9F05DC984D2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:security_key_lifecycle_manager:2.5.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96706B40-58F2-42C6-8BCF-C92F54438EA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:security_key_lifecycle_manager:2.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FAD90D4-0058-4DFB-8C72-DFBA3072C5C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:security_key_lifecycle_manager:2.6.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D107CCC-476F-4453-BF41-B83923E5D695\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:security_key_lifecycle_manager:2.6.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC7EB2EF-C7E1-4A44-9096-C3694BD5EBE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:security_key_lifecycle_manager:2.6.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EC75197-BBC8-4AA3-959D-4615410FC26B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:security_key_lifecycle_manager:2.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"910F6230-F3C5-4993-B1E8-89FC07697A46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:security_key_lifecycle_manager:2.7.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD31336F-4D30-4419-BBEB-516BA6646C38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:security_key_lifecycle_manager:2.7.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1807C6DB-650B-4249-B1EE-0C3E672EE360\"}]}]}],\"references\":[{\"url\":\"http://www.ibm.com/support/docview.wss?uid=swg21997955\",\"source\":\"psirt@us.ibm.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/102468\",\"source\":\"psirt@us.ibm.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/133636\",\"source\":\"psirt@us.ibm.com\",\"tags\":[\"VDB Entry\",\"Vendor Advisory\"]}]}}" } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.