cve-2024-38321
Vulnerability from cvelistv5
Published
2024-08-03 13:34
Modified
2024-08-03 18:49
Summary
IBM Business Automation Workflow information disclosure
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-38321",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-03T18:49:18.410755Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-03T18:49:24.893Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:ibm:business_automation_workflow:22.0.2:*:*:*:-:*:*:*",
            "cpe:2.3:a:ibm:business_automation_workflow:23.0.1:*:*:*:-:*:*:*",
            "cpe:2.3:a:ibm:business_automation_workflow:23.0.2:*:*:*:-:*:*:*",
            "cpe:2.3:a:ibm:business_automation_workflow:24.0.0:*:*:*:-:*:*:*"
          ],
          "defaultStatus": "unaffected",
          "product": "Business Automation Workflow",
          "vendor": "IBM",
          "versions": [
            {
              "status": "affected",
              "version": "22.0.2, 23.0.1, 23.0.2, 24.0.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "IBM Business Automation Workflow 22.0.2, 23.0.1, 23.0.2, and 24.0.0 stores potentially sensitive information in log files under certain situations that could be read by an authenticated user.  IBM X-Force ID:  284868."
            }
          ],
          "value": "IBM Business Automation Workflow 22.0.2, 23.0.1, 23.0.2, and 24.0.0 stores potentially sensitive information in log files under certain situations that could be read by an authenticated user.  IBM X-Force ID:  284868."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-532",
              "description": "CWE-532 Insertion of Sensitive Information into Log File",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-03T13:34:16.845Z",
        "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
        "shortName": "ibm"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.ibm.com/support/pages/node/7162334"
        },
        {
          "tags": [
            "vdb-entry"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/294868"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "IBM Business Automation Workflow information disclosure",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
    "assignerShortName": "ibm",
    "cveId": "CVE-2024-38321",
    "datePublished": "2024-08-03T13:34:16.845Z",
    "dateReserved": "2024-06-13T21:43:46.667Z",
    "dateUpdated": "2024-08-03T18:49:24.893Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-38321\",\"sourceIdentifier\":\"psirt@us.ibm.com\",\"published\":\"2024-08-03T14:15:48.013\",\"lastModified\":\"2024-09-06T14:50:53.583\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"IBM Business Automation Workflow 22.0.2, 23.0.1, 23.0.2, and 24.0.0 stores potentially sensitive information in log files under certain situations that could be read by an authenticated user.  IBM X-Force ID:  284868.\"},{\"lang\":\"es\",\"value\":\"IBM Business Automation Workflow 22.0.2, 23.0.1, 23.0.2 y 24.0.0 almacena informaci\u00f3n potencialmente confidencial en archivos de registro en determinadas situaciones que un usuario autenticado podr\u00eda leer. ID de IBM X-Force: 284868.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6},{\"source\":\"psirt@us.ibm.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":1.6,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"psirt@us.ibm.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-532\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:20.0.0.1:*:*:*:containers:*:*:*\",\"matchCriteriaId\":\"AEB1C9C9-69C0-41CA-8FE8-9E2C142DC112\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:20.0.0.2:*:*:*:containers:*:*:*\",\"matchCriteriaId\":\"B9C41C12-BD6B-4E49-9BA4-288524FF55C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.2:*:*:*:containers:*:*:*\",\"matchCriteriaId\":\"9FDDD905-95EA-4DCC-B359-7E6DAEFC537D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:-:*:*:containers:*:*:*\",\"matchCriteriaId\":\"12725407-1B9F-43B7-8D66-F0E3B0181830\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if002:*:*:containers:*:*:*\",\"matchCriteriaId\":\"00F5E82D-712A-4AB2-B0B2-BF03507D17D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if005:*:*:containers:*:*:*\",\"matchCriteriaId\":\"0063E78F-2978-43F6-884D-B375E1111E87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if006:*:*:containers:*:*:*\",\"matchCriteriaId\":\"CF6317BE-98DF-4A46-9F5B-326177D6AD68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if007:*:*:containers:*:*:*\",\"matchCriteriaId\":\"72A22C4B-AAF2-4A84-AF39-C1C396031D98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if008:*:*:containers:*:*:*\",\"matchCriteriaId\":\"39015A02-D36E-4CC9-A5E3-877DFD923ACD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if009:*:*:containers:*:*:*\",\"matchCriteriaId\":\"19586E74-8802-4C09-A240-D698EE30C570\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if010:*:*:containers:*:*:*\",\"matchCriteriaId\":\"4B06D109-E327-4A2A-9FC9-A5F454022C0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if011:*:*:containers:*:*:*\",\"matchCriteriaId\":\"E67BEF93-133E-4507-B938-79D943AB82CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if012:*:*:containers:*:*:*\",\"matchCriteriaId\":\"84689E35-3C11-44D2-B719-0F47CC7DE6B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if013:*:*:containers:*:*:*\",\"matchCriteriaId\":\"05248E0A-BE7C-4AA1-80B8-5397382D742E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if014:*:*:containers:*:*:*\",\"matchCriteriaId\":\"0852419C-62F1-49BA-BD99-96700D33ED64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if015:*:*:containers:*:*:*\",\"matchCriteriaId\":\"628B7F15-103F-4B84-90ED-EBFAD633BCE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if016:*:*:containers:*:*:*\",\"matchCriteriaId\":\"91E22A7B-18F4-461C-9986-0CECBAB879F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if017:*:*:containers:*:*:*\",\"matchCriteriaId\":\"4FE832E4-BE4B-4923-A98D-3B127758C103\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if028:*:*:containers:*:*:*\",\"matchCriteriaId\":\"EE7E0724-C7FB-4436-A702-EC2102205175\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if029:*:*:containers:*:*:*\",\"matchCriteriaId\":\"40505E62-F229-45B5-8D22-30487471477C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if030:*:*:containers:*:*:*\",\"matchCriteriaId\":\"D8E150F5-F27C-471C-A911-C2CC07E31EBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if031:*:*:containers:*:*:*\",\"matchCriteriaId\":\"3F8FA6E0-01CF-458A-8AD3-3388BBA4FE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if032:*:*:containers:*:*:*\",\"matchCriteriaId\":\"2CAF9596-964B-4E58-BB9D-07138F4566F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if033:*:*:containers:*:*:*\",\"matchCriteriaId\":\"08853431-59B4-4730-88E3-812DF7B6691B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if034:*:*:containers:*:*:*\",\"matchCriteriaId\":\"1BDB3D3C-1964-42F1-8035-2B4F2752E535\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:22.0.1:*:*:*:containers:*:*:*\",\"matchCriteriaId\":\"A157A0AD-B1AB-4FBB-AD00-348ADAE52173\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:22.0.2:*:*:*:containers:*:*:*\",\"matchCriteriaId\":\"F2F5CF83-2F00-476D-BA79-5BD0AF71D929\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:23.0.1:*:*:*:containers:*:*:*\",\"matchCriteriaId\":\"AC67163F-742E-46BC-BF63-75F15F8D2DCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:23.0.2:*:*:*:containers:*:*:*\",\"matchCriteriaId\":\"A99644F1-3E98-4156-B155-7FA642EA7BBC\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:traditional:*:*:*\",\"versionStartIncluding\":\"19.0.0.1\",\"versionEndIncluding\":\"19.0.0.3\",\"matchCriteriaId\":\"DB90C98C-7A38-4B9B-878C-028DD872D19C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:traditional:*:*:*\",\"versionStartIncluding\":\"20.0.0.1\",\"versionEndIncluding\":\"20.0.0.2\",\"matchCriteriaId\":\"1FD8E8F7-6B5F-4A21-90AF-483A8DFE4CFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:traditional:*:*:*\",\"versionStartIncluding\":\"21.0.1\",\"versionEndIncluding\":\"21.0.3.0\",\"matchCriteriaId\":\"07308147-9441-4231-9BC0-231C3181F255\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:traditional:*:*:*\",\"versionStartIncluding\":\"22.0.1\",\"versionEndIncluding\":\"22.0.2\",\"matchCriteriaId\":\"5CA224F7-AF29-4F8C-BD70-E9C0A7A2B366\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:traditional:*:*:*\",\"versionStartIncluding\":\"23.0.1\",\"versionEndIncluding\":\"23.0.2\",\"matchCriteriaId\":\"A510FD89-9F92-4514-A706-52719EDC59E0\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:enterprise_service_bus:*:*:*\",\"versionStartIncluding\":\"23.0.1\",\"versionEndIncluding\":\"23.0.2\",\"matchCriteriaId\":\"981B50AE-8B79-4E39-87AA-34DFA93B607A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:business_automation_workflow:22.0.2:*:*:*:enterprise_service_bus:*:*:*\",\"matchCriteriaId\":\"3E9B8E36-CA86-459C-A0CF-F00F179119FD\"}]}]}],\"references\":[{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/294868\",\"source\":\"psirt@us.ibm.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://www.ibm.com/support/pages/node/7162334\",\"source\":\"psirt@us.ibm.com\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.