6.5

CVE-2024-45651

IBM Sterling Connect:Direct Web Services session fixation

IBM Sterling Connect:Direct Web Services 6.1.0, 6.2.0, and 6.3.0 

does not invalidate session after a browser closure which could allow an authenticated user to impersonate another user on the system.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
IbmSterling Connect Direct Web Services Version >= 6.1.0 < 6.1.0.28
   IbmAix Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
IbmSterling Connect Direct Web Services Version >= 6.2.0 < 6.2.0.27
   IbmAix Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
IbmSterling Connect Direct Web Services Version >= 6.3.0 < 6.3.0.13
   IbmAix Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.13% 0.33
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.5 2.8 3.6
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
psirt@us.ibm.com 6.3 2.8 3.4
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
CWE-613 Insufficient Session Expiration

According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization."