CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:S/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
41.0%
IBM Tivoli Storage Manager (IBM Spectrum Protect) 6.1, 6.2, 6.3, and 7.1 does not perform sufficient authority checking on SQL queries. As a result, an attacker is able to submit SQL queries that access database tables that are not intended for access or use by administrators. The access of these product specific database tables may allow access to passwords or other sensitive information for the product. IBM Reference #: 1998946.
Vendor | Product | Version | CPE |
---|---|---|---|
ibm | tivoli_storage_manager | 6.1 | cpe:2.3:a:ibm:tivoli_storage_manager:6.1:*:*:*:*:*:*:* |
ibm | tivoli_storage_manager | 6.1.0 | cpe:2.3:a:ibm:tivoli_storage_manager:6.1.0:*:*:*:*:*:*:* |
ibm | tivoli_storage_manager | 6.1.1 | cpe:2.3:a:ibm:tivoli_storage_manager:6.1.1:*:*:*:*:*:*:* |
ibm | tivoli_storage_manager | 6.1.2 | cpe:2.3:a:ibm:tivoli_storage_manager:6.1.2:*:*:*:*:*:*:* |
ibm | tivoli_storage_manager | 6.1.3 | cpe:2.3:a:ibm:tivoli_storage_manager:6.1.3:*:*:*:*:*:*:* |
ibm | tivoli_storage_manager | 6.1.4 | cpe:2.3:a:ibm:tivoli_storage_manager:6.1.4:*:*:*:*:*:*:* |
ibm | tivoli_storage_manager | 6.1.5 | cpe:2.3:a:ibm:tivoli_storage_manager:6.1.5:*:*:*:*:*:*:* |
ibm | tivoli_storage_manager | 6.1.5.4 | cpe:2.3:a:ibm:tivoli_storage_manager:6.1.5.4:*:*:*:*:*:*:* |
ibm | tivoli_storage_manager | 6.1.5.5 | cpe:2.3:a:ibm:tivoli_storage_manager:6.1.5.5:*:*:*:*:*:*:* |
ibm | tivoli_storage_manager | 6.1.5.6 | cpe:2.3:a:ibm:tivoli_storage_manager:6.1.5.6:*:*:*:*:*:*:* |
[
{
"product": "Tivoli Storage Manager",
"vendor": "IBM Corporation",
"versions": [
{
"status": "affected",
"version": "5.3.5.3"
},
{
"status": "affected",
"version": "5.4.1.2"
},
{
"status": "affected",
"version": "4.2"
},
{
"status": "affected",
"version": "4.2.1"
},
{
"status": "affected",
"version": "5.1.8"
},
{
"status": "affected",
"version": "5.2.5.1"
},
{
"status": "affected",
"version": "5.2.7"
},
{
"status": "affected",
"version": "5.2.8"
},
{
"status": "affected",
"version": "5.2.9"
},
{
"status": "affected",
"version": "5.3.0"
},
{
"status": "affected",
"version": "5.3.1"
},
{
"status": "affected",
"version": "5.3.2"
},
{
"status": "affected",
"version": "5.3.3"
},
{
"status": "affected",
"version": "5.4.4.0"
},
{
"status": "affected",
"version": "5.4.2.4"
},
{
"status": "affected",
"version": "5.4.2.3"
},
{
"status": "affected",
"version": "5.4.2.2"
},
{
"status": "affected",
"version": "5.3.6.9"
},
{
"status": "affected",
"version": "5.3.6.2"
},
{
"status": "affected",
"version": "5.3.6.1"
},
{
"status": "affected",
"version": "5.3.4"
},
{
"status": "affected",
"version": "5.2.5.3"
},
{
"status": "affected",
"version": "5.2.5.2"
},
{
"status": "affected",
"version": "5.2.4"
},
{
"status": "affected",
"version": "5.3.5.1"
},
{
"status": "affected",
"version": "5.3.2.4"
},
{
"status": "affected",
"version": "6.0"
},
{
"status": "affected",
"version": "5.1.0"
},
{
"status": "affected",
"version": "5.1.1"
},
{
"status": "affected",
"version": "5.1.10"
},
{
"status": "affected",
"version": "5.1.5"
},
{
"status": "affected",
"version": "5.1.6"
},
{
"status": "affected",
"version": "5.1.7"
},
{
"status": "affected",
"version": "5.1.9"
},
{
"status": "affected",
"version": "5.2.0"
},
{
"status": "affected",
"version": "5.2.1"
},
{
"status": "affected",
"version": "4.2.2"
},
{
"status": "affected",
"version": "4.2.3"
},
{
"status": "affected",
"version": "4.2.4"
},
{
"status": "affected",
"version": "5.2.2"
},
{
"status": "affected",
"version": "5.3"
},
{
"status": "affected",
"version": "5.2 Client"
},
{
"status": "affected",
"version": "5.4 Client"
},
{
"status": "affected",
"version": "5.5.7"
},
{
"status": "affected",
"version": "5.2.3.4 Client"
},
{
"status": "affected",
"version": "5.5.1.0"
},
{
"status": "affected",
"version": "5.5.1.6"
},
{
"status": "affected",
"version": "5.4"
},
{
"status": "affected",
"version": "5.5"
},
{
"status": "affected",
"version": "6.1"
},
{
"status": "affected",
"version": "6.2"
},
{
"status": "affected",
"version": "6.3"
},
{
"status": "affected",
"version": "6.4"
},
{
"status": "affected",
"version": "7.1"
}
]
}
]
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:S/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
41.0%