8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
A vulnerability in Open Source BeanShell has been addressed by LMS
CVEID: CVE-2016-2510
DESCRIPTION: BeanShell could allow a remote attacker to execute arbitrary code on the system, caused by the deserialization of untrusted data using Java serialization or XStream. An attacker could exploit this vulnerability deserialize data and execute arbitrary code on the system.
CVSS Base Score: 7.5
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/111295> for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P)
4.0, 4.1, 4.2.x, 5.0, 5.1
The issue has been fixed in IBM LMS 5.2. IBM recommends updating to the latest release.
IBM LMS is available via IBM Passport Advantage. The following link directs you to the Passport Advantage Online Web site. Passport Advantage is a secure Web site that requires an account ID and password.
<http://www.ibm.com/software/how-to-buy/passportadvantage/pao_customers.htm>
A fix for all affected versions can be downloaded from Fix Central
[http://www.ibm.com/support/fixcentral/quickorder?product=ibm%2FLotus%2FIBM+Kenexa+LMS&fixids=bsh_vulnerability&source=SAR](<http://www.ibm.com/support/fixcentral/quickorder?product=ibm%2FLotus%2FIBM+Kenexa+LMS&fixids=bsh_vulnerability&source=SAR>)
8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P