CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
AI Score
Confidence
High
IBM Maximo Application Suite - Monitor Component uses follow-redirects-1.15.4.tgz and follow-redirects-1.15.5.tgz which are vulnerable to CVE-2024-28849. This bulletin identifies the steps to take to address the vulnerabilities.
CVEID:CVE-2024-28849
**DESCRIPTION:**Node.js follow-redirects module could allow a remote authenticated attacker to obtain sensitive information, caused by the leakage of credentials when clearing authorization header during cross-domain redirect, but keeping the proxy-authentication header. An attacker could exploit this vulnerability to obtain credentials and other sensitive information.
CVSS Base score: 6.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/285690 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)
Affected Product(s) | Version(s) |
---|---|
IBM Maximo Application Suite - Monitor Component | 8.11 |
IBM Maximo Application Suite - Monitor Component | 8.10 |
Affected Product(s) | Fixpack Version(s) |
---|---|
IBM Maximo Application Suite - Monitor Component | 8.11.7 or latest (available from the Catalog under Update Available) |
IBM Maximo Application Suite - Monitor Component | 8.10.10 or latest (available from the Catalog under Update Available) |
None
Vendor | Product | Version | CPE |
---|---|---|---|
ibm | maximo_application_suite | 8.11 | cpe:2.3:a:ibm:maximo_application_suite:8.11:*:*:*:*:*:*:* |
ibm | maximo_application_suite | 8.10 | cpe:2.3:a:ibm:maximo_application_suite:8.10:*:*:*:*:*:*:* |
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
AI Score
Confidence
High