cve-2025-2824
Vulnerability from cvelistv5
Published
2025-08-01 17:46
Modified
2025-08-01 18:07
Severity ?
EPSS score ?
Summary
IBM Operational Decision Manager HTTP open redirect
References
▼ | URL | Tags | |
---|---|---|---|
psirt@us.ibm.com | https://www.ibm.com/support/pages/node/7241286 | Vendor Advisory |
Impacted products
▼ | Vendor | Product |
---|---|---|
IBM | Operational Decision Manager |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-2824", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-01T18:07:12.808015Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-01T18:07:22.830Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:ibm:operational_decision_manager:8.11.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:operational_decision_manager:8.11.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:operational_decision_manager:8.12.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:operational_decision_manager:9.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:operational_decision_manager:9.5.0:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "Operational Decision Manager", "vendor": "IBM", "versions": [ { "status": "affected", "version": "8.11.0.1" }, { "status": "affected", "version": "8.11.1.0" }, { "status": "affected", "version": "8.12.0.1" }, { "status": "affected", "version": "9.0.0.1" }, { "status": "affected", "version": "9.5.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "IBM Operational Decision Manager 8.11.0.1, 8.11.1.0, 8.12.0.1, 9.0.0.1, and 9.5.0 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim." } ], "value": "IBM Operational Decision Manager 8.11.0.1, 8.11.1.0, 8.12.0.1, 9.0.0.1, and 9.5.0 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-601", "description": "CWE-601 URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-01T17:46:30.472Z", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "vendor-advisory", "patch" ], "url": "https://www.ibm.com/support/pages/node/7241286" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eIBM Operational Decision Manager V8.11.0.1\u003cbr\u003eInterim fix 046 is available, see \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/support/pages/node/7238508\"\u003edownload document\u003c/a\u003e.\u003c/p\u003e\u003cp\u003eIBM Operational Decision Manager V8.11.1:\u003cbr\u003eInterim fix 044 is available, see \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/support/pages/node/7237139\"\u003edownload document\u003c/a\u003e.\u003c/p\u003e\u003cp\u003eIBM Operational Decision Manager V8.12.0.1:\u003cbr\u003eInterim fix 028 is available, see \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/support/pages/node/7236479\"\u003edownload document\u003c/a\u003e.\u003c/p\u003e\u003cp\u003eIBM Operational Decision Manager V9.0.0.1:\u003cbr\u003eInterim fix 011 is available, see \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/support/pages/node/7230722\"\u003edownload document\u003c/a\u003e.\u003c/p\u003e\u003cp\u003e\u0026nbsp;IBM Operational Decision Manager V9.5.0.0:\u003cbr\u003eInterim fix 002 is available, see \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/support/pages/node/7233740\"\u003edownload document\u003c/a\u003e\u003c/p\u003e\n\n\u003cbr\u003e" } ], "value": "IBM Operational Decision Manager V8.11.0.1\nInterim fix 046 is available, see download document https://www.ibm.com/support/pages/node/7238508 .\n\nIBM Operational Decision Manager V8.11.1:\nInterim fix 044 is available, see download document https://www.ibm.com/support/pages/node/7237139 .\n\nIBM Operational Decision Manager V8.12.0.1:\nInterim fix 028 is available, see download document https://www.ibm.com/support/pages/node/7236479 .\n\nIBM Operational Decision Manager V9.0.0.1:\nInterim fix 011 is available, see download document https://www.ibm.com/support/pages/node/7230722 .\n\n\u00a0IBM Operational Decision Manager V9.5.0.0:\nInterim fix 002 is available, see download document https://www.ibm.com/support/pages/node/7233740" } ], "source": { "discovery": "UNKNOWN" }, "title": "IBM Operational Decision Manager HTTP open redirect", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2025-2824", "datePublished": "2025-08-01T17:46:30.472Z", "dateReserved": "2025-03-26T15:42:06.334Z", "dateUpdated": "2025-08-01T18:07:22.830Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2025-2824\",\"sourceIdentifier\":\"psirt@us.ibm.com\",\"published\":\"2025-08-01T18:15:51.587\",\"lastModified\":\"2025-08-14T18:49:21.380\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"IBM Operational Decision Manager 8.11.0.1, 8.11.1.0, 8.12.0.1, 9.0.0.1, and 9.5.0 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim.\"},{\"lang\":\"es\",\"value\":\"IBM Operational Decision Manager 8.11.0.1, 8.11.1.0, 8.12.0.1, 9.0.0.1 y 9.5.0 podr\u00eda permitir que un atacante remoto realice ataques de phishing mediante un ataque de redirecci\u00f3n abierta. Al persuadir a la v\u00edctima para que visite un sitio web especialmente manipulado, un atacante remoto podr\u00eda explotar esta vulnerabilidad para falsificar la URL mostrada y redirigir al usuario a un sitio web malicioso aparentemente confiable. Esto podr\u00eda permitir al atacante obtener informaci\u00f3n altamente sensible o realizar nuevos ataques contra la v\u00edctima.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@us.ibm.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N\",\"baseScore\":7.4,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":4.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N\",\"baseScore\":7.4,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":4.0}]},\"weaknesses\":[{\"source\":\"psirt@us.ibm.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-601\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:operational_decision_manager:8.11.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"354E0F39-CA38-4A27-973B-7415C7A40FC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:operational_decision_manager:8.11.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4E8894F-E7F5-4514-873A-C63CB8DFCC6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:operational_decision_manager:8.12.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60B60CD2-D71D-43FE-B9AD-A11FE5FC132E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:operational_decision_manager:9.0.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DCB5F24-4C9B-4D1F-85BE-08708EFB777A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:operational_decision_manager:9.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CD731C1-390A-401C-A2BC-931445381424\"}]}]}],\"references\":[{\"url\":\"https://www.ibm.com/support/pages/node/7241286\",\"source\":\"psirt@us.ibm.com\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.