cve-2024-38321
Vulnerability from cvelistv5
Published
2024-08-03 13:34
Modified
2024-08-03 18:49
Severity ?
EPSS score ?
Summary
IBM Business Automation Workflow information disclosure
References
▼ | URL | Tags | |
---|---|---|---|
psirt@us.ibm.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/294868 | Broken Link | |
psirt@us.ibm.com | https://www.ibm.com/support/pages/node/7162334 | Vendor Advisory |
Impacted products
▼ | Vendor | Product |
---|---|---|
IBM | Business Automation Workflow |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-38321", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-03T18:49:18.410755Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-03T18:49:24.893Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:ibm:business_automation_workflow:22.0.2:*:*:*:-:*:*:*", "cpe:2.3:a:ibm:business_automation_workflow:23.0.1:*:*:*:-:*:*:*", "cpe:2.3:a:ibm:business_automation_workflow:23.0.2:*:*:*:-:*:*:*", "cpe:2.3:a:ibm:business_automation_workflow:24.0.0:*:*:*:-:*:*:*" ], "defaultStatus": "unaffected", "product": "Business Automation Workflow", "vendor": "IBM", "versions": [ { "status": "affected", "version": "22.0.2, 23.0.1, 23.0.2, 24.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "IBM Business Automation Workflow 22.0.2, 23.0.1, 23.0.2, and 24.0.0 stores potentially sensitive information in log files under certain situations that could be read by an authenticated user. IBM X-Force ID: 284868." } ], "value": "IBM Business Automation Workflow 22.0.2, 23.0.1, 23.0.2, and 24.0.0 stores potentially sensitive information in log files under certain situations that could be read by an authenticated user. IBM X-Force ID: 284868." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "CWE-532 Insertion of Sensitive Information into Log File", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-03T13:34:16.845Z", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.ibm.com/support/pages/node/7162334" }, { "tags": [ "vdb-entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/294868" } ], "source": { "discovery": "UNKNOWN" }, "title": "IBM Business Automation Workflow information disclosure", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2024-38321", "datePublished": "2024-08-03T13:34:16.845Z", "dateReserved": "2024-06-13T21:43:46.667Z", "dateUpdated": "2024-08-03T18:49:24.893Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-38321\",\"sourceIdentifier\":\"psirt@us.ibm.com\",\"published\":\"2024-08-03T14:15:48.013\",\"lastModified\":\"2024-09-06T14:50:53.583\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"IBM Business Automation Workflow 22.0.2, 23.0.1, 23.0.2, and 24.0.0 stores potentially sensitive information in log files under certain situations that could be read by an authenticated user. IBM X-Force ID: 284868.\"},{\"lang\":\"es\",\"value\":\"IBM Business Automation Workflow 22.0.2, 23.0.1, 23.0.2 y 24.0.0 almacena informaci\u00f3n potencialmente confidencial en archivos de registro en determinadas situaciones que un usuario autenticado podr\u00eda leer. ID de IBM X-Force: 284868.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6},{\"source\":\"psirt@us.ibm.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":1.6,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"psirt@us.ibm.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-532\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:20.0.0.1:*:*:*:containers:*:*:*\",\"matchCriteriaId\":\"AEB1C9C9-69C0-41CA-8FE8-9E2C142DC112\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:20.0.0.2:*:*:*:containers:*:*:*\",\"matchCriteriaId\":\"B9C41C12-BD6B-4E49-9BA4-288524FF55C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.2:*:*:*:containers:*:*:*\",\"matchCriteriaId\":\"9FDDD905-95EA-4DCC-B359-7E6DAEFC537D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:-:*:*:containers:*:*:*\",\"matchCriteriaId\":\"12725407-1B9F-43B7-8D66-F0E3B0181830\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if002:*:*:containers:*:*:*\",\"matchCriteriaId\":\"00F5E82D-712A-4AB2-B0B2-BF03507D17D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if005:*:*:containers:*:*:*\",\"matchCriteriaId\":\"0063E78F-2978-43F6-884D-B375E1111E87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if006:*:*:containers:*:*:*\",\"matchCriteriaId\":\"CF6317BE-98DF-4A46-9F5B-326177D6AD68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if007:*:*:containers:*:*:*\",\"matchCriteriaId\":\"72A22C4B-AAF2-4A84-AF39-C1C396031D98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if008:*:*:containers:*:*:*\",\"matchCriteriaId\":\"39015A02-D36E-4CC9-A5E3-877DFD923ACD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if009:*:*:containers:*:*:*\",\"matchCriteriaId\":\"19586E74-8802-4C09-A240-D698EE30C570\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if010:*:*:containers:*:*:*\",\"matchCriteriaId\":\"4B06D109-E327-4A2A-9FC9-A5F454022C0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if011:*:*:containers:*:*:*\",\"matchCriteriaId\":\"E67BEF93-133E-4507-B938-79D943AB82CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if012:*:*:containers:*:*:*\",\"matchCriteriaId\":\"84689E35-3C11-44D2-B719-0F47CC7DE6B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if013:*:*:containers:*:*:*\",\"matchCriteriaId\":\"05248E0A-BE7C-4AA1-80B8-5397382D742E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if014:*:*:containers:*:*:*\",\"matchCriteriaId\":\"0852419C-62F1-49BA-BD99-96700D33ED64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if015:*:*:containers:*:*:*\",\"matchCriteriaId\":\"628B7F15-103F-4B84-90ED-EBFAD633BCE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if016:*:*:containers:*:*:*\",\"matchCriteriaId\":\"91E22A7B-18F4-461C-9986-0CECBAB879F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if017:*:*:containers:*:*:*\",\"matchCriteriaId\":\"4FE832E4-BE4B-4923-A98D-3B127758C103\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if028:*:*:containers:*:*:*\",\"matchCriteriaId\":\"EE7E0724-C7FB-4436-A702-EC2102205175\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if029:*:*:containers:*:*:*\",\"matchCriteriaId\":\"40505E62-F229-45B5-8D22-30487471477C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if030:*:*:containers:*:*:*\",\"matchCriteriaId\":\"D8E150F5-F27C-471C-A911-C2CC07E31EBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if031:*:*:containers:*:*:*\",\"matchCriteriaId\":\"3F8FA6E0-01CF-458A-8AD3-3388BBA4FE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if032:*:*:containers:*:*:*\",\"matchCriteriaId\":\"2CAF9596-964B-4E58-BB9D-07138F4566F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if033:*:*:containers:*:*:*\",\"matchCriteriaId\":\"08853431-59B4-4730-88E3-812DF7B6691B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if034:*:*:containers:*:*:*\",\"matchCriteriaId\":\"1BDB3D3C-1964-42F1-8035-2B4F2752E535\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:22.0.1:*:*:*:containers:*:*:*\",\"matchCriteriaId\":\"A157A0AD-B1AB-4FBB-AD00-348ADAE52173\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:22.0.2:*:*:*:containers:*:*:*\",\"matchCriteriaId\":\"F2F5CF83-2F00-476D-BA79-5BD0AF71D929\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:23.0.1:*:*:*:containers:*:*:*\",\"matchCriteriaId\":\"AC67163F-742E-46BC-BF63-75F15F8D2DCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:23.0.2:*:*:*:containers:*:*:*\",\"matchCriteriaId\":\"A99644F1-3E98-4156-B155-7FA642EA7BBC\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:traditional:*:*:*\",\"versionStartIncluding\":\"19.0.0.1\",\"versionEndIncluding\":\"19.0.0.3\",\"matchCriteriaId\":\"DB90C98C-7A38-4B9B-878C-028DD872D19C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:traditional:*:*:*\",\"versionStartIncluding\":\"20.0.0.1\",\"versionEndIncluding\":\"20.0.0.2\",\"matchCriteriaId\":\"1FD8E8F7-6B5F-4A21-90AF-483A8DFE4CFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:traditional:*:*:*\",\"versionStartIncluding\":\"21.0.1\",\"versionEndIncluding\":\"21.0.3.0\",\"matchCriteriaId\":\"07308147-9441-4231-9BC0-231C3181F255\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:traditional:*:*:*\",\"versionStartIncluding\":\"22.0.1\",\"versionEndIncluding\":\"22.0.2\",\"matchCriteriaId\":\"5CA224F7-AF29-4F8C-BD70-E9C0A7A2B366\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:traditional:*:*:*\",\"versionStartIncluding\":\"23.0.1\",\"versionEndIncluding\":\"23.0.2\",\"matchCriteriaId\":\"A510FD89-9F92-4514-A706-52719EDC59E0\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:enterprise_service_bus:*:*:*\",\"versionStartIncluding\":\"23.0.1\",\"versionEndIncluding\":\"23.0.2\",\"matchCriteriaId\":\"981B50AE-8B79-4E39-87AA-34DFA93B607A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:22.0.2:*:*:*:enterprise_service_bus:*:*:*\",\"matchCriteriaId\":\"3E9B8E36-CA86-459C-A0CF-F00F179119FD\"}]}]}],\"references\":[{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/294868\",\"source\":\"psirt@us.ibm.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://www.ibm.com/support/pages/node/7162334\",\"source\":\"psirt@us.ibm.com\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.