8.8
CVE-2022-42435
- EPSS 0.05%
- Published 04.01.2023 00:15:10
- Last modified 21.11.2024 07:24:57
- Source psirt@us.ibm.com
- Teams watchlist Login
- Open Login
IBM Business Automation Workflow 18.0.0, 18.0.1, 18.0.2, 19.0.1, 19.0.2, 19.0.3, 20.0.1, 20.0.2, 20.0.3, 21.0.1, 21.0.2, 21.0.3, and 22.0.1 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 238054.
Data is provided by the National Vulnerability Database (NVD)
Ibm ≫ Business Automation Workflow Version18.0.0
Ibm ≫ Business Automation Workflow Version18.0.1
Ibm ≫ Business Automation Workflow Version18.0.2
Ibm ≫ Business Automation Workflow Version19.0.1
Ibm ≫ Business Automation Workflow Version19.0.2
Ibm ≫ Business Automation Workflow Version19.0.3
Ibm ≫ Business Automation Workflow Version20.0.1
Ibm ≫ Business Automation Workflow Version20.0.2
Ibm ≫ Business Automation Workflow Version20.0.3
Ibm ≫ Business Automation Workflow Version21.0.1
Ibm ≫ Business Automation Workflow Version21.0.1 Updateif001
Ibm ≫ Business Automation Workflow Version21.0.1 Updateif002
Ibm ≫ Business Automation Workflow Version21.0.1 Updateif003
Ibm ≫ Business Automation Workflow Version21.0.1 Updateif004
Ibm ≫ Business Automation Workflow Version21.0.1 Updateif005
Ibm ≫ Business Automation Workflow Version21.0.1 Updateif006
Ibm ≫ Business Automation Workflow Version21.0.1 Updateif007
Ibm ≫ Business Automation Workflow Version21.0.2
Ibm ≫ Business Automation Workflow Version21.0.2 Updateif001
Ibm ≫ Business Automation Workflow Version21.0.2 Updateif002
Ibm ≫ Business Automation Workflow Version21.0.2 Updateif003
Ibm ≫ Business Automation Workflow Version21.0.2 Updateif004
Ibm ≫ Business Automation Workflow Version21.0.2 Updateif005
Ibm ≫ Business Automation Workflow Version21.0.2 Updateif006
Ibm ≫ Business Automation Workflow Version21.0.2 Updateif007
Ibm ≫ Business Automation Workflow Version21.0.2 Updateif008
Ibm ≫ Business Automation Workflow Version21.0.2 Updateif009
Ibm ≫ Business Automation Workflow Version21.0.2 Updateif010
Ibm ≫ Business Automation Workflow Version21.0.2 Updateif011
Ibm ≫ Business Automation Workflow Version21.0.2 Updateif012
Ibm ≫ Business Automation Workflow Version21.0.3
Ibm ≫ Business Automation Workflow Version21.0.3 Updateif001
Ibm ≫ Business Automation Workflow Version21.0.3 Updateif002
Ibm ≫ Business Automation Workflow Version21.0.3 Updateif003
Ibm ≫ Business Automation Workflow Version21.0.3 Updateif004
Ibm ≫ Business Automation Workflow Version21.0.3 Updateif005
Ibm ≫ Business Automation Workflow Version21.0.3 Updateif006
Ibm ≫ Business Automation Workflow Version21.0.3 Updateif007
Ibm ≫ Business Automation Workflow Version21.0.3 Updateif008
Ibm ≫ Business Automation Workflow Version21.0.3 Updateif009
Ibm ≫ Business Automation Workflow Version21.0.3 Updateif010
Ibm ≫ Business Automation Workflow Version21.0.3 Updateif011
Ibm ≫ Business Automation Workflow Version21.0.3 Updateif012
Ibm ≫ Business Automation Workflow Version21.0.3 Updateif013
Ibm ≫ Business Automation Workflow Version21.0.3 Updateif014
Ibm ≫ Business Automation Workflow Version21.0.3 Updateif015
Ibm ≫ Business Automation Workflow Version22.0.1
Ibm ≫ Business Automation Workflow Version22.0.1 Updateif001
Ibm ≫ Business Automation Workflow Version22.0.1 Updateif002
Ibm ≫ Business Automation Workflow Version22.0.1 Updateif003
Ibm ≫ Business Automation Workflow Version22.0.1 Updateif004
Ibm ≫ Business Automation Workflow Version22.0.1 Updateif005
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.05% | 0.138 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
psirt@us.ibm.com | 4.3 | 2.8 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
|
CWE-352 Cross-Site Request Forgery (CSRF)
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.