3.5 Low
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:S/C:N/I:P/A:N
5.4 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.5 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
28.9%
IBM Cloud Orchestrator 2.4 through 2.4.0.5 and 2.5 through 2.5.0.9 is vulnerable to HTTP response splitting attacks, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability to inject arbitrary HTTP headers and cause the server to return a split response, once the URL is clicked. This would allow the attacker to perform further attacks, such as Web cache poisoning or cross-site scripting, and possibly obtain sensitive information. IBM X-Force ID: 162236.
Vendor | Product | Version | CPE |
---|---|---|---|
ibm | cloud_orchestrator | 2.4 | cpe:2.3:a:ibm:cloud_orchestrator:2.4:*:*:*:*:*:*:* |
ibm | cloud_orchestrator | 2.4.0.1 | cpe:2.3:a:ibm:cloud_orchestrator:2.4.0.1:*:*:*:*:*:*:* |
ibm | cloud_orchestrator | 2.4.0.2 | cpe:2.3:a:ibm:cloud_orchestrator:2.4.0.2:*:*:*:*:*:*:* |
ibm | cloud_orchestrator | 2.5 | cpe:2.3:a:ibm:cloud_orchestrator:2.5:*:*:*:*:*:*:* |
ibm | cloud_orchestrator | 2.5.0.1 | cpe:2.3:a:ibm:cloud_orchestrator:2.5.0.1:*:*:*:*:*:*:* |
ibm | cloud_orchestrator | 2.4.0.3 | cpe:2.3:a:ibm:cloud_orchestrator:2.4.0.3:*:*:*:*:*:*:* |
ibm | cloud_orchestrator | 2.5.0.2 | cpe:2.3:a:ibm:cloud_orchestrator:2.5.0.2:*:*:*:*:*:*:* |
ibm | cloud_orchestrator | 2.4.0.4 | cpe:2.3:a:ibm:cloud_orchestrator:2.4.0.4:*:*:*:*:*:*:* |
ibm | cloud_orchestrator | 2.5.0.3 | cpe:2.3:a:ibm:cloud_orchestrator:2.5.0.3:*:*:*:*:*:*:* |
ibm | cloud_orchestrator | 2.5.0.4 | cpe:2.3:a:ibm:cloud_orchestrator:2.5.0.4:*:*:*:*:*:*:* |
[
{
"product": "Cloud Orchestrator",
"vendor": "IBM",
"versions": [
{
"status": "affected",
"version": "2.4"
},
{
"status": "affected",
"version": "2.4.0.1"
},
{
"status": "affected",
"version": "2.4.0.2"
},
{
"status": "affected",
"version": "2.5"
},
{
"status": "affected",
"version": "2.5.0.1"
},
{
"status": "affected",
"version": "2.4.0.3"
},
{
"status": "affected",
"version": "2.5.0.2"
},
{
"status": "affected",
"version": "2.4.0.4"
},
{
"status": "affected",
"version": "2.5.0.3"
},
{
"status": "affected",
"version": "2.5.0.4"
},
{
"status": "affected",
"version": "2.4.0.5"
},
{
"status": "affected",
"version": "2.5.0.5"
},
{
"status": "affected",
"version": "2.5.0.6"
},
{
"status": "affected",
"version": "2.5.0.7"
},
{
"status": "affected",
"version": "2.5.0.8"
},
{
"status": "affected",
"version": "2.5.0.9"
}
]
}
]
3.5 Low
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:S/C:N/I:P/A:N
5.4 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.5 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
28.9%