6.8
CVE-2013-0598
- EPSS 0.12%
- Published 28.09.2013 03:40:55
- Last modified 11.04.2025 00:51:21
- Source psirt@us.ibm.com
- Teams watchlist Login
- Open Login
Cross-site request forgery (CSRF) vulnerability in the Web Client in IBM Rational ClearQuest 7.1 before 7.1.2.12, 8.0 before 8.0.0.8, and 8.0.1 before 8.0.1.1 allows remote attackers to hijack the authentication of arbitrary users.
Data is provided by the National Vulnerability Database (NVD)
Ibm ≫ Rational Clearquest Version7.1.1.1
Ibm ≫ Rational Clearquest Version7.1.1.2
Ibm ≫ Rational Clearquest Version7.1.1.3
Ibm ≫ Rational Clearquest Version7.1.1.4
Ibm ≫ Rational Clearquest Version7.1.1.5
Ibm ≫ Rational Clearquest Version7.1.1.6
Ibm ≫ Rational Clearquest Version7.1.1.7
Ibm ≫ Rational Clearquest Version7.1.1.8
Ibm ≫ Rational Clearquest Version7.1.2
Ibm ≫ Rational Clearquest Version7.1.2.1
Ibm ≫ Rational Clearquest Version7.1.2.2
Ibm ≫ Rational Clearquest Version7.1.2.3
Ibm ≫ Rational Clearquest Version7.1.2.4
Ibm ≫ Rational Clearquest Version7.1.2.5
Ibm ≫ Rational Clearquest Version7.1.2.6
Ibm ≫ Rational Clearquest Version7.1.2.7
Ibm ≫ Rational Clearquest Version7.1.2.8
Ibm ≫ Rational Clearquest Version7.1.2.9
Ibm ≫ Rational Clearquest Version7.1.2.10
Ibm ≫ Rational Clearquest Version7.1.2.11
Ibm ≫ Rational Clearquest Version8.0
Ibm ≫ Rational Clearquest Version8.0.0.1
Ibm ≫ Rational Clearquest Version8.0.0.2
Ibm ≫ Rational Clearquest Version8.0.0.3
Ibm ≫ Rational Clearquest Version8.0.0.4
Ibm ≫ Rational Clearquest Version8.0.0.5
Ibm ≫ Rational Clearquest Version8.0.0.6
Ibm ≫ Rational Clearquest Version8.0.0.7
Ibm ≫ Rational Clearquest Version8.0.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.12% | 0.275 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 6.8 | 8.6 | 6.4 |
AV:N/AC:M/Au:N/C:P/I:P/A:P
|
CWE-352 Cross-Site Request Forgery (CSRF)
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.