Lucene search

K
ibmIBM95658618D26DDB4E3627089CBCD442CB05B17B0B36F284381DC829CEBD509178
HistoryApr 06, 2023 - 10:17 p.m.

Security Bulletin: Privilege Escalation vulnerability

2023-04-0622:17:57
www.ibm.com
16
ibm sterling order management
privilege escalation
authorization check
data tampering

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

0.001 Low

EPSS

Percentile

39.8%

Summary

An attacker/malicious user can tamper data sent in the forms fields to execute restricted functions,manipulate stored data, or alter the application workflow. The Web application does not perform orincorrectly performs an authorization check when a user attempts to access a resource or perform anaction.

Vulnerability Details

CVEID:CVE-2022-33959
**DESCRIPTION:**IBM Sterling Order Management could allow a user to bypass validation and perform unauthorized actions on behalf of other users.
CVSS Base score: 5.4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/229320 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Sterling Order Management 10.0

Remediation/Fixes

<https://www.ibm.com/docs/en/order-management-sw/10.0?topic=new-in-certified-containers&gt;

Order Management on premise release notes - <https://www.ibm.com/docs/en/order-management-sw/10.0?topic=new-in-certified-containers&gt;

Fix Central Link (FP details URL):
http://www.ibm.com/support/fixcentral/quickorder?product=ibm%2FOther+software%2FSterling+Selling+and+Fulfillment+Foundation&fixids=10.0.0.0-Sterling-SSFF-All-fp29-Installer&source=SAR

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmsterling_order_managementMatch10.0
CPENameOperatorVersion
ibm sterling order managementeq10.0

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

0.001 Low

EPSS

Percentile

39.8%

Related for 95658618D26DDB4E3627089CBCD442CB05B17B0B36F284381DC829CEBD509178