Undergoing Analysis
CVE has been recently published to the CVE List and has been received by the NVD.
CVE has been recently published to the CVE List and has been received by the NVD.
Products
IBM Aspera Faspex
- 5.0.0
- 5.0.1
- 5.0.2
- 5.0.3
- 5.0.4
- 5.0.5
- 5.0.6
- 5.0.7
- 5.0.8
- 5.0.9
Source
psirt@us.ibm.com
Tags
CVE-2024-45097 details
Published : Sept. 5, 2024, 4:15 p.m.
Last Modified : Sept. 5, 2024, 5:44 p.m.
Last Modified : Sept. 5, 2024, 5:44 p.m.
Description
IBM Aspera Faspex 5.0.0 through 5.0.9 could allow a user to bypass intended access restrictions and conduct resource modification.
CVSS Score
1 | 2 | 3 | 4 | 5.9 | 6 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-650 | Trusting HTTP Permission Methods on the Server Side | The server contains a protection mechanism that assumes that any URI that is accessed using HTTP GET will not cause a state change to the associated resource. This might allow attackers to bypass intended access restrictions and conduct resource modification and deletion attacks, since some applications allow GET to modify state. |
CVSS Data
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
HIGH
Availability Impact
NONE
Base Score
5.9
Exploitability Score
1.6
Impact Score
4.2
Base Severity
MEDIUM
Vector String : CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:N
References
URL | Source |
---|---|
https://www.ibm.com/support/pages/node/7167255 | psirt@us.ibm.com |
This website uses the NVD API, but is not approved or certified by it.