Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2017-1171

Summary
Assigner-ibm
Assigner Org ID-9a959283-ebb5-44b6-b705-dcc2bbced522
Published At-31 Mar, 2017 | 18:00
Updated At-05 Aug, 2024 | 13:25
Rejected At-
Credits

The IBM TRIRIGA Application Platform 3.3, 3,4, and 3,5 contain a vulnerability that could allow an authenticated user to execute Application actions they do not have access to. IBM Reference #: 2001083.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:ibm
Assigner Org ID:9a959283-ebb5-44b6-b705-dcc2bbced522
Published At:31 Mar, 2017 | 18:00
Updated At:05 Aug, 2024 | 13:25
Rejected At:
▼CVE Numbering Authority (CNA)

The IBM TRIRIGA Application Platform 3.3, 3,4, and 3,5 contain a vulnerability that could allow an authenticated user to execute Application actions they do not have access to. IBM Reference #: 2001083.

Affected Products
Vendor
IBM CorporationIBM Corporation
Product
TRIRIGA Application Platform
Versions
Affected
  • 3.2
  • 3.2.1
  • 3.1
  • 3.0
  • 3.3
  • 3.3.1
  • 2.7
  • 2.6
  • 2.5
  • 2.1
  • 3.3.2
  • 3.4
  • 3.4.1
  • 3.4.2
  • 3.5
  • 3.5.1
  • 3.5.2
Problem Types
TypeCWE IDDescription
textN/AGain Privileges
Type: text
CWE ID: N/A
Description: Gain Privileges
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securityfocus.com/bid/97245
vdb-entry
x_refsource_BID
https://www.ibm.com/support/docview.wss?uid=swg22001083
x_refsource_CONFIRM
Hyperlink: http://www.securityfocus.com/bid/97245
Resource:
vdb-entry
x_refsource_BID
Hyperlink: https://www.ibm.com/support/docview.wss?uid=swg22001083
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securityfocus.com/bid/97245
vdb-entry
x_refsource_BID
x_transferred
https://www.ibm.com/support/docview.wss?uid=swg22001083
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securityfocus.com/bid/97245
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://www.ibm.com/support/docview.wss?uid=swg22001083
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt@us.ibm.com
Published At:31 Mar, 2017 | 18:59
Updated At:20 Apr, 2025 | 01:37

The IBM TRIRIGA Application Platform 3.3, 3,4, and 3,5 contain a vulnerability that could allow an authenticated user to execute Application actions they do not have access to. IBM Reference #: 2001083.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.04.3MEDIUM
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Primary2.04.0MEDIUM
AV:N/AC:L/Au:S/C:N/I:P/A:N
Type: Primary
Version: 3.0
Base score: 4.3
Base severity: MEDIUM
Vector:
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Type: Primary
Version: 2.0
Base score: 4.0
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:S/C:N/I:P/A:N
CPE Matches

IBM Corporation
ibm
>>tririga_application_platform>>3.3.0.0
cpe:2.3:a:ibm:tririga_application_platform:3.3.0.0:*:*:*:*:*:*:*
IBM Corporation
ibm
>>tririga_application_platform>>3.3.0.1
cpe:2.3:a:ibm:tririga_application_platform:3.3.0.1:*:*:*:*:*:*:*
IBM Corporation
ibm
>>tririga_application_platform>>3.3.0.2
cpe:2.3:a:ibm:tririga_application_platform:3.3.0.2:*:*:*:*:*:*:*
IBM Corporation
ibm
>>tririga_application_platform>>3.3.1.0
cpe:2.3:a:ibm:tririga_application_platform:3.3.1.0:*:*:*:*:*:*:*
IBM Corporation
ibm
>>tririga_application_platform>>3.3.1.1
cpe:2.3:a:ibm:tririga_application_platform:3.3.1.1:*:*:*:*:*:*:*
IBM Corporation
ibm
>>tririga_application_platform>>3.3.1.2
cpe:2.3:a:ibm:tririga_application_platform:3.3.1.2:*:*:*:*:*:*:*
IBM Corporation
ibm
>>tririga_application_platform>>3.3.1.3
cpe:2.3:a:ibm:tririga_application_platform:3.3.1.3:*:*:*:*:*:*:*
IBM Corporation
ibm
>>tririga_application_platform>>3.3.2.0
cpe:2.3:a:ibm:tririga_application_platform:3.3.2.0:*:*:*:*:*:*:*
IBM Corporation
ibm
>>tririga_application_platform>>3.3.2.1
cpe:2.3:a:ibm:tririga_application_platform:3.3.2.1:*:*:*:*:*:*:*
IBM Corporation
ibm
>>tririga_application_platform>>3.3.2.2
cpe:2.3:a:ibm:tririga_application_platform:3.3.2.2:*:*:*:*:*:*:*
IBM Corporation
ibm
>>tririga_application_platform>>3.3.2.3
cpe:2.3:a:ibm:tririga_application_platform:3.3.2.3:*:*:*:*:*:*:*
IBM Corporation
ibm
>>tririga_application_platform>>3.3.2.4
cpe:2.3:a:ibm:tririga_application_platform:3.3.2.4:*:*:*:*:*:*:*
IBM Corporation
ibm
>>tririga_application_platform>>3.3.2.5
cpe:2.3:a:ibm:tririga_application_platform:3.3.2.5:*:*:*:*:*:*:*
IBM Corporation
ibm
>>tririga_application_platform>>3.4.0.0
cpe:2.3:a:ibm:tririga_application_platform:3.4.0.0:*:*:*:*:*:*:*
IBM Corporation
ibm
>>tririga_application_platform>>3.4.0.1
cpe:2.3:a:ibm:tririga_application_platform:3.4.0.1:*:*:*:*:*:*:*
IBM Corporation
ibm
>>tririga_application_platform>>3.4.1.0
cpe:2.3:a:ibm:tririga_application_platform:3.4.1.0:*:*:*:*:*:*:*
IBM Corporation
ibm
>>tririga_application_platform>>3.4.1.1
cpe:2.3:a:ibm:tririga_application_platform:3.4.1.1:*:*:*:*:*:*:*
IBM Corporation
ibm
>>tririga_application_platform>>3.4.1.2
cpe:2.3:a:ibm:tririga_application_platform:3.4.1.2:*:*:*:*:*:*:*
IBM Corporation
ibm
>>tririga_application_platform>>3.4.1.3
cpe:2.3:a:ibm:tririga_application_platform:3.4.1.3:*:*:*:*:*:*:*
IBM Corporation
ibm
>>tririga_application_platform>>3.4.2.0
cpe:2.3:a:ibm:tririga_application_platform:3.4.2.0:*:*:*:*:*:*:*
IBM Corporation
ibm
>>tririga_application_platform>>3.4.2.1
cpe:2.3:a:ibm:tririga_application_platform:3.4.2.1:*:*:*:*:*:*:*
IBM Corporation
ibm
>>tririga_application_platform>>3.4.2.2
cpe:2.3:a:ibm:tririga_application_platform:3.4.2.2:*:*:*:*:*:*:*
IBM Corporation
ibm
>>tririga_application_platform>>3.4.2.3
cpe:2.3:a:ibm:tririga_application_platform:3.4.2.3:*:*:*:*:*:*:*
IBM Corporation
ibm
>>tririga_application_platform>>3.4.2.4
cpe:2.3:a:ibm:tririga_application_platform:3.4.2.4:*:*:*:*:*:*:*
IBM Corporation
ibm
>>tririga_application_platform>>3.4.2.5
cpe:2.3:a:ibm:tririga_application_platform:3.4.2.5:*:*:*:*:*:*:*
IBM Corporation
ibm
>>tririga_application_platform>>3.5.0.0
cpe:2.3:a:ibm:tririga_application_platform:3.5.0.0:*:*:*:*:*:*:*
IBM Corporation
ibm
>>tririga_application_platform>>3.5.0.1
cpe:2.3:a:ibm:tririga_application_platform:3.5.0.1:*:*:*:*:*:*:*
IBM Corporation
ibm
>>tririga_application_platform>>3.5.0.2
cpe:2.3:a:ibm:tririga_application_platform:3.5.0.2:*:*:*:*:*:*:*
IBM Corporation
ibm
>>tririga_application_platform>>3.5.1
cpe:2.3:a:ibm:tririga_application_platform:3.5.1:*:*:*:*:*:*:*
IBM Corporation
ibm
>>tririga_application_platform>>3.5.1.1
cpe:2.3:a:ibm:tririga_application_platform:3.5.1.1:*:*:*:*:*:*:*
IBM Corporation
ibm
>>tririga_application_platform>>3.5.1.2
cpe:2.3:a:ibm:tririga_application_platform:3.5.1.2:*:*:*:*:*:*:*
IBM Corporation
ibm
>>tririga_application_platform>>3.5.1.3
cpe:2.3:a:ibm:tririga_application_platform:3.5.1.3:*:*:*:*:*:*:*
IBM Corporation
ibm
>>tririga_application_platform>>3.5.2
cpe:2.3:a:ibm:tririga_application_platform:3.5.2:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-noinfoPrimarynvd@nist.gov
CWE ID: NVD-CWE-noinfo
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.securityfocus.com/bid/97245psirt@us.ibm.com
Third Party Advisory
VDB Entry
https://www.ibm.com/support/docview.wss?uid=swg22001083psirt@us.ibm.com
Patch
Vendor Advisory
http://www.securityfocus.com/bid/97245af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
https://www.ibm.com/support/docview.wss?uid=swg22001083af854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
Hyperlink: http://www.securityfocus.com/bid/97245
Source: psirt@us.ibm.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://www.ibm.com/support/docview.wss?uid=swg22001083
Source: psirt@us.ibm.com
Resource:
Patch
Vendor Advisory
Hyperlink: http://www.securityfocus.com/bid/97245
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://www.ibm.com/support/docview.wss?uid=swg22001083
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

112Records found

CVE-2021-29845
Matching Score-8
Assigner-IBM Corporation
ShareView Details
Matching Score-8
Assigner-IBM Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.19% / 41.30%
||
7 Day CHG~0.00%
Published-26 Jan, 2022 | 17:40
Updated-17 Sep, 2024 | 02:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Security Guardium Insights 3.0 could allow an authenticated user to perform unauthorized actions due to improper input validation. IBM X-Force ID: 205255.

Action-Not Available
Vendor-IBM Corporation
Product-security_guardium_insightsSecurity Guardium Insights
CWE ID-CWE-20
Improper Input Validation
CVE-2021-29770
Matching Score-8
Assigner-IBM Corporation
ShareView Details
Matching Score-8
Assigner-IBM Corporation
CVSS Score-4.1||MEDIUM
EPSS-0.13% / 33.72%
||
7 Day CHG~0.00%
Published-26 Jul, 2021 | 12:10
Updated-16 Sep, 2024 | 20:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM i2 Analyst's Notebook Premium (IBM i2 Analyze 4.3.0, 4.3.1, and 4.3.2) could allow an authenticated user to perform unauthorized actions due to hazardous input validation. IBM X-Force ID: 202771.

Action-Not Available
Vendor-IBM CorporationLinux Kernel Organization, IncMicrosoft Corporation
Product-windowsi2_analyzelinux_kerneli2 Analyze
CWE ID-CWE-20
Improper Input Validation
CVE-2021-20461
Matching Score-8
Assigner-IBM Corporation
ShareView Details
Matching Score-8
Assigner-IBM Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.19% / 41.41%
||
7 Day CHG~0.00%
Published-30 Jun, 2021 | 13:25
Updated-16 Sep, 2024 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Cognos Analytics 10.0 and 11.1 is susceptible to a weakness in the implementation of the System Appearance configuration setting. An attacker could potentially bypass business logic to modify the appearance and behavior of the application. IBM X-Force ID: 196770.

Action-Not Available
Vendor-IBM CorporationNetApp, Inc.
Product-cognos_analyticsoncommand_insightCognos Analytics
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2017-1555
Matching Score-8
Assigner-IBM Corporation
ShareView Details
Matching Score-8
Assigner-IBM Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.21% / 44.08%
||
7 Day CHG~0.00%
Published-25 Sep, 2017 | 16:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM API Connect 5.0.0.0 through 5.0.7.2 could allow an authenticated user to generate an API token when not subscribed to the application plan. IBM X-Force ID: 131545.

Action-Not Available
Vendor-IBM Corporation
Product-api_connectAPI Connect
CWE ID-CWE-20
Improper Input Validation
CVE-2016-8973
Matching Score-8
Assigner-IBM Corporation
ShareView Details
Matching Score-8
Assigner-IBM Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.19% / 41.07%
||
7 Day CHG~0.00%
Published-20 Mar, 2017 | 16:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Rhapsody DM 4.0, 5.0 and 6.0 contains an undisclosed vulnerability that may allow an authenticated user to upload infected malicious files to the server. IBM Reference #: 1999960.

Action-Not Available
Vendor-IBM Corporation
Product-rational_rhapsody_design_managerRational Rhapsody Design Manager
CWE ID-CWE-434
Unrestricted Upload of File with Dangerous Type
CVE-2020-4461
Matching Score-8
Assigner-IBM Corporation
ShareView Details
Matching Score-8
Assigner-IBM Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.17% / 39.17%
||
7 Day CHG~0.00%
Published-20 May, 2020 | 12:35
Updated-16 Sep, 2024 | 22:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Security Access Manager Appliance 9.0.7.1 could allow an authenticated user to bypass security by allowing id_token claims manipulation without verification. IBM X-Force ID: 181481.

Action-Not Available
Vendor-IBM Corporation
Product-security_access_managerSecurity Access Manager Appliance
CVE-2020-4282
Matching Score-8
Assigner-IBM Corporation
ShareView Details
Matching Score-8
Assigner-IBM Corporation
CVSS Score-3||LOW
EPSS-0.17% / 39.17%
||
7 Day CHG~0.00%
Published-08 Apr, 2020 | 14:05
Updated-16 Sep, 2024 | 23:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Security Information Queue (ISIQ) 1.0.0, 1.0.1, 1.0.2, 1.0.3, 1.0.4, and 1.0.5 could allow an authenticated user to perform unauthorized actions by bypassing illegal character restrictions. X-Force ID: 176205.

Action-Not Available
Vendor-IBM Corporation
Product-security_information_queueSecurity Information Queue
CWE ID-CWE-116
Improper Encoding or Escaping of Output
CVE-2020-4151
Matching Score-8
Assigner-IBM Corporation
ShareView Details
Matching Score-8
Assigner-IBM Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.13% / 33.72%
||
7 Day CHG~0.00%
Published-14 Apr, 2020 | 15:10
Updated-17 Sep, 2024 | 02:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM QRadar SIEM 7.3.0 through 7.3.3 could allow an authenticated attacker to perform unauthorized actions due to improper input validation. IBM X-Force ID: 174201.

Action-Not Available
Vendor-IBM Corporation
Product-qradar_security_information_and_event_managerQRadar SIEM
CWE ID-CWE-20
Improper Input Validation
CVE-2020-4259
Matching Score-8
Assigner-IBM Corporation
ShareView Details
Matching Score-8
Assigner-IBM Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.10% / 28.71%
||
7 Day CHG~0.00%
Published-14 May, 2020 | 15:50
Updated-16 Sep, 2024 | 16:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Sterling File Gateway 2.2.0.0 through 6.0.3.1 could allow an authenticated user could manipulate cookie information and remove or add modules from the cookie to access functionality not authorized to. IBM X-Force ID: 175638.

Action-Not Available
Vendor-Microsoft CorporationHP Inc.IBM CorporationLinux Kernel Organization, IncOracle Corporation
Product-sterling_file_gatewaysolarislinux_kernelihp-uxwindowsaixSterling File Gateway
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2020-4719
Matching Score-8
Assigner-IBM Corporation
ShareView Details
Matching Score-8
Assigner-IBM Corporation
CVSS Score-4.9||MEDIUM
EPSS-0.22% / 44.47%
||
7 Day CHG~0.00%
Published-02 Mar, 2021 | 16:55
Updated-16 Sep, 2024 | 21:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The IBM Cloud APM 8.1.4 server will issue a DNS request to resolve any hostname specified in the Cloud Event Management Webhook URL configuration definition. This could enable an authenticated user with admin authorization to create DNS query strings that are not hostnames. IBM X-Force ID: 187861.

Action-Not Available
Vendor-IBM Corporation
Product-cloud_application_performance_managementCloud APM
CWE ID-CWE-706
Use of Incorrectly-Resolved Name or Reference
CVE-2020-4632
Matching Score-8
Assigner-IBM Corporation
ShareView Details
Matching Score-8
Assigner-IBM Corporation
CVSS Score-5.7||MEDIUM
EPSS-0.12% / 32.21%
||
7 Day CHG~0.00%
Published-04 Sep, 2020 | 13:35
Updated-17 Sep, 2024 | 01:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM InfoSphere Metadata Asset Manager 11.7 is vulnerable to server-side request forgery. By sending a specially crafted request, a remote authenticated attacker could exploit this vulnerability to submit or control server requests. IBM X-Force ID: 185416.

Action-Not Available
Vendor-IBM Corporation
Product-infosphere_metadata_asset_managerInfoSphere Information Server
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2020-4548
Matching Score-8
Assigner-IBM Corporation
ShareView Details
Matching Score-8
Assigner-IBM Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.18% / 39.65%
||
7 Day CHG~0.00%
Published-20 Aug, 2020 | 15:55
Updated-16 Sep, 2024 | 20:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Content Navigator 3.0.7 and 3.0.8 is vulnerable to improper input validation. A malicious administrator could bypass the user interface and send requests to the IBM Content Navigator server with illegal characters that could be stored in the IBM Content Navigator database. IBM X-Force ID: 183316.

Action-Not Available
Vendor-IBM CorporationLinux Kernel Organization, IncMicrosoft Corporation
Product-aixwindowscontent_navigatorlinux_kernelContent Navigator
CWE ID-CWE-20
Improper Input Validation
  • Previous
  • 1
  • 2
  • 3
  • Next
Details not found