There is a vulnerability in python-requests that could allow a remote attacker to obtain sensitive information. The code is used by IBM Process Mining. This bulletin identifies the security fixes to apply to address the vulnerability.
CVEID:CVE-2023-32681
**DESCRIPTION:**python-requests could allow a remote attacker to obtain sensitive information, caused by the leaking of Proxy-Authorization headers to destination servers during redirects to an HTTPS origin. By persuading a victim to click on a specially crafted URL, an attacker could exploit this vulnerability to obtain sensitive information.
CVSS Base score: 6.1
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/256114 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N)
Affected Product(s) | Version(s) |
---|---|
IBM Process Mining | 1.14.0, 1.14.1 |
Remediation/Fixes guidance:
Product(s) | **Version(s) number and/or range ** | Remediation/Fix/Instructions |
---|---|---|
IBM Process Mining |
1.14.1,
1.14.0
|
Upgrade to version 1.14.2
1.Login to PassPortAdvantage
2. Search for
M0FHQML
Process Mining 1.14.2 Server Multiplatform Multilingual
3. Download package
4. Follow install instructions
5. Repeat for M0FHRML Process Mining 1.14.2 Client Windows Multilingual
| |
Workarounds/Mitigation guidance:
None known
CPE | Name | Operator | Version |
---|---|---|---|
ibm cloud pak for automation | eq | 1.14.1 | |
ibm cloud pak for automation | eq | 1.14.0 |