Lucene search

K
ibmIBM3237392F7DD5F297BB27A5423AC22D70513E07F152D9B45F3DEC365FB524C5DB
HistoryMay 11, 2024 - 4:55 p.m.

Security Bulletin: IBM Storage Fusion is vulnerable to phishing attacks due to follow-redirects package.

2024-05-1116:55:10
www.ibm.com
4
ibm storage fusion
phishing attacks
follow-redirects
open redirect vulnerability
cve-2023-26159
upgrade instructions

6.7 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

19.4%

Summary

follow-redirects is used by IBM Storage Fusion as part of the Installer and may be vulnerable to the CVE listed below. CVE-2023-26159.

Vulnerability Details

CVEID:CVE-2023-26159
**DESCRIPTION:**follow-redirects could allow a remote attacker to conduct phishing attacks, caused by an open redirect vulnerability. An attacker could exploit this vulnerability using a specially crafted URL to redirect a victim to arbitrary Web sites.
CVSS Base score: 6.1
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/278622 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)

Affected Products and Versions

Affected Product(s)|**Version(s)
**
โ€”|โ€”
IBM Storage Fusion| 2.3.0 - 2.7.1

Remediation/Fixes

Product(s) **Version(s) number and/or range ** Remediation/Fix/Instructions
IBM Storage Fusion 2.3.0 - 2.7.1 Upgrade to 2.8.0 - See README for upgrade instructions.

Workarounds and Mitigations

NA

6.7 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

19.4%