Show plain JSON{"id": "CVE-2017-1758", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:P", "authentication": "SINGLE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 4.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 7.1, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "LOW", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 4.2, "exploitabilityScore": 2.8}]}, "published": "2018-02-21T21:29:00.377", "references": [{"url": "http://www.ibm.com/support/docview.wss?uid=swg22012828", "tags": ["Patch", "Vendor Advisory"], "source": "psirt@us.ibm.com"}, {"url": "http://www.ibm.com/support/docview.wss?uid=swg22013375", "tags": ["Patch", "Vendor Advisory"], "source": "psirt@us.ibm.com"}, {"url": "http://www.ibm.com/support/docview.wss?uid=swg22013432", "tags": ["Vendor Advisory"], "source": "psirt@us.ibm.com"}, {"url": "http://www.securityfocus.com/bid/103130", "tags": ["Third Party Advisory", "VDB Entry"], "source": "psirt@us.ibm.com"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/135859", "tags": ["VDB Entry", "Vendor Advisory"], "source": "psirt@us.ibm.com"}, {"url": "http://www.ibm.com/support/docview.wss?uid=swg22012828", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.ibm.com/support/docview.wss?uid=swg22013375", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.ibm.com/support/docview.wss?uid=swg22013432", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/103130", "tags": ["Third Party Advisory", "VDB Entry"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/135859", "tags": ["VDB Entry", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-611"}]}], "descriptions": [{"lang": "en", "value": "IBM Financial Transaction Manager for ACH Services for Multi-Platform (IBM Control Center 6.0 and 6.1, IBM Financial Transaction Manager 3.0.2, 3.0.3, 3.0.4, and 3.1.0, IBM Transformation Extender Advanced 9.0) is vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 135859."}, {"lang": "es", "value": "IBM Financial Transaction Manager para ACH Services Multi-Platform (IBM Control Center 6.0 y 6.1; IBM Financial Transaction Manager 3.0.2, 3.0.3, 3.0.4 y 3.1.0; IBM Transformation Extender Advanced 9.0) es vulnerable a un ataque de XEE (XML External Entity) al procesar datos XML. Un atacante remoto podr\u00eda explotar esta vulnerabilidad para exponer informaci\u00f3n sensible o consumir recursos de la memoria. IBM X-Force ID: 135859."}], "lastModified": "2024-11-21T03:22:19.470", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:ibm:financial_transaction_manager:3.0.2.0:*:*:*:*:ach_services:*:*", "vulnerable": true, "matchCriteriaId": "84CBA4CA-B6A0-46A0-90A1-31ACB24DEA04"}, {"criteria": "cpe:2.3:a:ibm:financial_transaction_manager:3.0.2.0:*:*:*:*:cps_services:*:*", "vulnerable": true, "matchCriteriaId": "97879C5D-9C1A-472E-A310-58A4BD641F00"}, {"criteria": "cpe:2.3:a:ibm:financial_transaction_manager:3.0.2.1:*:*:*:*:ach_services:*:*", "vulnerable": true, "matchCriteriaId": "BD4E52FE-E3DE-433D-93F6-D05AB9DBA462"}, {"criteria": "cpe:2.3:a:ibm:financial_transaction_manager:3.0.3.0:*:*:*:*:ach_services:*:*", "vulnerable": true, "matchCriteriaId": "E34E5E99-AE0C-413B-AE92-2B982EDAC330"}, {"criteria": "cpe:2.3:a:ibm:financial_transaction_manager:3.0.4.0:*:*:*:*:ach_services:*:*", "vulnerable": true, "matchCriteriaId": "FDA7F3AE-EC33-4802-8A89-FDD6C3186B1A"}, {"criteria": "cpe:2.3:a:ibm:financial_transaction_manager:3.1.0.0:*:*:*:*:ach_services:*:*", "vulnerable": true, "matchCriteriaId": "E5BB666B-92D0-413C-9A2B-A65DDC513668"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:ibm:transformation_extender_advanced:9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51961B3B-AA03-4021-8804-F9D2FE07C073"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:ibm:control_center:6.0.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E25AFD79-FD16-41A5-8BB0-B85E02EE0CCE"}, {"criteria": "cpe:2.3:a:ibm:control_center:6.0.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "92B67822-6ED4-4487-98F6-3E9AA36DC241"}, {"criteria": "cpe:2.3:a:ibm:control_center:6.1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EADF5BB2-AE21-4F3F-9882-C471DE94CBE3"}, {"criteria": "cpe:2.3:a:ibm:control_center:6.1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DD12F576-7CD7-4B83-800E-EAC369E79F94"}, {"criteria": "cpe:2.3:a:ibm:control_center:6.1.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F188797B-0146-491B-8AF4-278DDD578974"}], "operator": "OR"}]}], "sourceIdentifier": "psirt@us.ibm.com"}