IBM Sterling Connect:Direct for UNIX File Agent component is affected by security restriction bypass due to Spring Framework. Spring Framework has been upgraded in IBM Sterling Connect:Direct for UNIX File Agent component. [CVE-2023-20860]
CVEID:CVE-2023-20860
**DESCRIPTION:**VMware Tanzu Spring Framework could allow a remote attacker to bypass security restrictions, caused by the use of an un-prefixed double wildcard pattern with the mvcRequestMatcher in Spring Security configuration. An attacker could exploit this vulnerability to create a mismatch in pattern matching between Spring Security and Spring MVC.
CVSS Base score: 9.1
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/250679 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)
Affected Product(s) | Version(s) |
---|---|
IBM Sterling Connect:Direct for UNIX | 6.2.0.0 - 6.2.0.6.iFix012 |
IBM strongly recommends addressing the vulnerability now by upgrading
Product | Version | Remediation/Fix/Instructions |
---|---|---|
IBM Sterling Connect:Direct for UNIX | 6.2.0 | Apply 6.2.0.6.iFix013, available on Fix Central. |
None
CPE | Name | Operator | Version |
---|---|---|---|
ibm sterling connect:direct for unix | eq | 6.2.0 |