IBM Planning Analytics 2.0 is vulnerable to a Remote File Include (RFI) attack. User input could be passed into file include commands and the web application could be tricked into including remote files with malicious code. IBM X-Force ID: 216891.
References
Link | Resource |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/216891 | VDB Entry Vendor Advisory |
https://www.ibm.com/support/pages/node/6557106 | Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/216891 | VDB Entry Vendor Advisory |
https://www.ibm.com/support/pages/node/6557106 | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 06:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/216891 - VDB Entry, Vendor Advisory | |
References | () https://www.ibm.com/support/pages/node/6557106 - Patch, Vendor Advisory |
08 Aug 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-829 |
01 Mar 2022, 14:29
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:ibm:planning_analytics:2.0:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 7.8 |
CWE | CWE-77 | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/216891 - VDB Entry, Vendor Advisory | |
References | (CONFIRM) https://www.ibm.com/support/pages/node/6557106 - Patch, Vendor Advisory |
21 Feb 2022, 19:15
Type | Values Removed | Values Added |
---|---|---|
Summary | IBM Planning Analytics 2.0 is vulnerable to a Remote File Include (RFI) attack. User input could be passed into file include commands and the web application could be tricked into including remote files with malicious code. IBM X-Force ID: 216891. |
21 Feb 2022, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-02-21 18:15
Updated : 2024-11-21 06:46
NVD link : CVE-2022-22308
Mitre link : CVE-2022-22308
CVE.ORG link : CVE-2022-22308
JSON object : View
Products Affected
ibm
- planning_analytics
CWE
CWE-829
Inclusion of Functionality from Untrusted Control Sphere