CVE-2020-4272

IBM QRadar 7.3.0 to 7.3.3 Patch 2 could allow a remote attacker to include arbitrary files. A remote attacker could send a specially-crafted request specify a malicious file from a remote system, which could allow the attacker to execute arbitrary code on the vulnerable server. IBM X-ForceID: 175898.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:ibm:qradar_security_information_and_event_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:-:*:*:*:*:*:*
cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:p1:*:*:*:*:*:*
cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:p2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:32

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/157337/QRadar-Community-Edition-7.3.1.6-Arbitrary-Object-Instantiation.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/157337/QRadar-Community-Edition-7.3.1.6-Arbitrary-Object-Instantiation.html - Exploit, Third Party Advisory, VDB Entry
References () http://seclists.org/fulldisclosure/2020/Apr/40 - Exploit, Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2020/Apr/40 - Exploit, Mailing List, Third Party Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/175898 - VDB Entry, Vendor Advisory () https://exchange.xforce.ibmcloud.com/vulnerabilities/175898 - VDB Entry, Vendor Advisory
References () https://www.ibm.com/support/pages/node/6189645 - Vendor Advisory () https://www.ibm.com/support/pages/node/6189645 - Vendor Advisory

Information

Published : 2020-04-15 16:15

Updated : 2024-11-21 05:32


NVD link : CVE-2020-4272

Mitre link : CVE-2020-4272

CVE.ORG link : CVE-2020-4272


JSON object : View

Products Affected

ibm

  • qradar_security_information_and_event_manager

linux

  • linux_kernel
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-502

Deserialization of Untrusted Data