9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
In the WebSphere Application Server (WAS) where the Rational Asset Manager(RAM) is deployed, a potential vulnerability in the Apache Commons FileUpload is identified. Information about this security vulnerability affecting WebSphere Application Server has been published in a security bulletin.
Refer to the Remediation/Fixes section.
Rational Asset Manager 7.5.3.2 and earlier.
The remediation is applicable for both Rational Asset Manager and WebSphere Application Server (WAS).
For applying fix on WAS, refer to the security bulletin specified in the following table for information about fixes.
Affected Supporting Product |
Affected Supporting Product Security Bulletin
—|—
IBM WebSphere Application Server Version 8.0, 8.5 and 8.5.5 |
For applying fix on RAM, upgrade to Rational Asset Manager 7.5.3.3 or**Download theiFix **as specified in the following table. Version | Fix |
---|---|
Rational Asset Manager 7.5.2.4 | Rational Asset Manager 7.5.2.4 iFix Download. |
NOTE: For support on other Rational Asset Manager versions, please contact IBM support.
None.
CPE | Name | Operator | Version |
---|---|---|---|
rational asset manager | eq | 7.5 | |
rational asset manager | eq | 7.5.1 |
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P