Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-x587-v4ch-32xv

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

IBM Multi-Enterprise Integration Gateway 1.x through 1.0.0.1 and B2B Advanced Communications 1.0.0.2 and 1.0.0.3 before 1.0.0.3_2, when access by guests is enabled, place an internal hostname and a payload path in a response, which allows remote authenticated users to obtain sensitive information by leveraging a trading-partner relationship and reading response fields.

IBM Multi-Enterprise Integration Gateway 1.x through 1.0.0.1 and B2B Advanced Communications 1.0.0.2 and 1.0.0.3 before 1.0.0.3_2, when access by guests is enabled, place an internal hostname and a payload path in a response, which allows remote authenticated users to obtain sensitive information by leveraging a trading-partner relationship and reading response fields.

EPSS

Процентиль: 45%
0.00225
Низкий

Дефекты

CWE-200

Связанные уязвимости

nvd
больше 10 лет назад

IBM Multi-Enterprise Integration Gateway 1.x through 1.0.0.1 and B2B Advanced Communications 1.0.0.2 and 1.0.0.3 before 1.0.0.3_2, when access by guests is enabled, place an internal hostname and a payload path in a response, which allows remote authenticated users to obtain sensitive information by leveraging a trading-partner relationship and reading response fields.

EPSS

Процентиль: 45%
0.00225
Низкий

Дефекты

CWE-200