ID

VAR-201804-0750


CVE

CVE-2018-1421


TITLE

IBM WebSphere DataPower Appliances In XML External entity vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2018-003762

DESCRIPTION

IBM WebSphere DataPower Appliances 7.1, 7.2, 7.5, 7.5.1, 7.5.2, and 7.6 is vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 139023. Vendors have confirmed this vulnerability IBM X-Force ID: 139023 It is released as.Information is obtained and service operation is interrupted (DoS) There is a possibility of being put into a state. IBM DataPower Gateways 7.1.0.0 through 7.1.0.21, 7.2.0.0 through 7.2.0.18, 7.5.0.0 through 7.5.0.13, 7.5.1.0 through 7.5.1.12, 7.5.2.0 through 7.5.2.12 and 7.6.0.0 through 7.6.0.5 are vulnerable; other versions may also be affected. The appliance is primarily used to simplify, secure and accelerate XML and Web services deployment in SOA. The following versions are affected: IBM WebSphere DataPower Appliances Version 7.1, Version 7.2, Version 7.5, Version 7.5.1, Version 7.5.2, Version 7.6

Trust: 1.98

sources: NVD: CVE-2018-1421 // JVNDB: JVNDB-2018-003762 // BID: 103741 // VULHUB: VHN-124346

AFFECTED PRODUCTS

vendor:ibmmodel:datapower gatewayscope:gteversion:7.2.0.0

Trust: 1.0

vendor:ibmmodel:datapower gatewayscope:gteversion:7.6.0.0

Trust: 1.0

vendor:ibmmodel:datapower gatewayscope:lteversion:7.5.2.12

Trust: 1.0

vendor:ibmmodel:datapower gatewayscope:lteversion:7.5.0.13

Trust: 1.0

vendor:ibmmodel:datapower gatewayscope:gteversion:7.5.2.0

Trust: 1.0

vendor:ibmmodel:datapower gatewayscope:lteversion:7.2.0.18

Trust: 1.0

vendor:ibmmodel:datapower gatewayscope:gteversion:7.1.0.0

Trust: 1.0

vendor:ibmmodel:datapower gatewayscope:lteversion:7.1.0.21

Trust: 1.0

vendor:ibmmodel:datapower gatewayscope:lteversion:7.5.1.12

Trust: 1.0

vendor:ibmmodel:datapower gatewayscope:lteversion:7.6.0.5

Trust: 1.0

vendor:ibmmodel:datapower gatewayscope:gteversion:7.5.1.0

Trust: 1.0

vendor:ibmmodel:datapower gatewayscope:gteversion:7.5.0.0

Trust: 1.0

vendor:ibmmodel:datapower gatewayscope:eqversion:7.1

Trust: 0.8

vendor:ibmmodel:datapower gatewayscope:eqversion:7.2

Trust: 0.8

vendor:ibmmodel:datapower gatewayscope:eqversion:7.5

Trust: 0.8

vendor:ibmmodel:datapower gatewayscope:eqversion:7.5.1

Trust: 0.8

vendor:ibmmodel:datapower gatewayscope:eqversion:7.5.2

Trust: 0.8

vendor:ibmmodel:datapower gatewayscope:eqversion:7.6

Trust: 0.8

vendor:ibmmodel:datapower gatewayscope:eqversion:7.2.0.0

Trust: 0.6

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.6.0.5

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.6.0.1

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.6.0.0

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.5.2.9

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.5.2.8

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.5.2.2

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.5.2.12

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.5.2.1

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.5.2.0

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.5.1.9

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.5.1.8

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.5.1.4

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.5.1.3

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.5.1.2

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.5.1.12

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.5.1.1

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.5.1.0

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.5.0.9

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.5.0.5

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.5.0.4

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.5.0.3

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.5.0.2

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.5.0.13

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.5.0.10

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.5.0.1

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.5.0.0

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.2.0.9

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.2.0.8

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.2.0.6

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.2.0.5

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.2.0.4

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.2.0.3

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.2.0.2

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.2.0.18

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.2.0.16

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.2.0.15

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.2.0.11

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.2.0.10

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.2.0.1

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.2.0.0

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.1.0.9

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.1.0.8

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.1.0.7

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.1.0.6

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.1.0.5

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.1.0.19

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.1.0.18

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.1.0.14

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.1.0.13

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.1.0.12

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.1.0.11

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.1.0.10

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.1.0.0

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:neversion:7.6.0.6

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:neversion:7.5.2.13

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:neversion:7.5.1.13

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:neversion:7.5.0.14

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:neversion:7.2.0.19

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:neversion:7.1.0.22

Trust: 0.3

sources: BID: 103741 // JVNDB: JVNDB-2018-003762 // CNNVD: CNNVD-201804-309 // NVD: CVE-2018-1421

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-1421
value: HIGH

Trust: 1.0

psirt@us.ibm.com: CVE-2018-1421
value: HIGH

Trust: 1.0

NVD: CVE-2018-1421
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201804-309
value: HIGH

Trust: 0.6

VULHUB: VHN-124346
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-1421
severity: MEDIUM
baseScore: 5.5
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-124346
severity: MEDIUM
baseScore: 5.5
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-1421
baseSeverity: HIGH
baseScore: 7.1
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: LOW
exploitabilityScore: 2.8
impactScore: 4.2
version: 3.0

Trust: 2.8

sources: VULHUB: VHN-124346 // JVNDB: JVNDB-2018-003762 // CNNVD: CNNVD-201804-309 // NVD: CVE-2018-1421 // NVD: CVE-2018-1421

PROBLEMTYPE DATA

problemtype:CWE-611

Trust: 1.9

sources: VULHUB: VHN-124346 // JVNDB: JVNDB-2018-003762 // NVD: CVE-2018-1421

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201804-309

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-201804-309

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-003762

PATCH

title:2015055url:http://www-01.ibm.com/support/docview.wss?uid=swg22015055

Trust: 0.8

title:ibm-websphere-cve20181421-info-disc (139023)url:https://exchange.xforce.ibmcloud.com/vulnerabilities/139023

Trust: 0.8

title:IBM WebSphere DataPower Appliances Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=83125

Trust: 0.6

sources: JVNDB: JVNDB-2018-003762 // CNNVD: CNNVD-201804-309

EXTERNAL IDS

db:NVDid:CVE-2018-1421

Trust: 2.8

db:JVNDBid:JVNDB-2018-003762

Trust: 0.8

db:CNNVDid:CNNVD-201804-309

Trust: 0.6

db:BIDid:103741

Trust: 0.4

db:VULHUBid:VHN-124346

Trust: 0.1

sources: VULHUB: VHN-124346 // BID: 103741 // JVNDB: JVNDB-2018-003762 // CNNVD: CNNVD-201804-309 // NVD: CVE-2018-1421

REFERENCES

url:http://www.ibm.com/support/docview.wss?uid=swg22015055

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/139023

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-1421

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-1421

Trust: 0.8

url:http://www.ibm.com/

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg22015055

Trust: 0.3

sources: VULHUB: VHN-124346 // BID: 103741 // JVNDB: JVNDB-2018-003762 // CNNVD: CNNVD-201804-309 // NVD: CVE-2018-1421

CREDITS

Moshe Mizrahi

Trust: 0.3

sources: BID: 103741

SOURCES

db:VULHUBid:VHN-124346
db:BIDid:103741
db:JVNDBid:JVNDB-2018-003762
db:CNNVDid:CNNVD-201804-309
db:NVDid:CVE-2018-1421

LAST UPDATE DATE

2024-11-23T23:12:12.746000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-124346date:2019-10-09T00:00:00
db:BIDid:103741date:2018-03-27T00:00:00
db:JVNDBid:JVNDB-2018-003762date:2018-06-04T00:00:00
db:CNNVDid:CNNVD-201804-309date:2019-10-17T00:00:00
db:NVDid:CVE-2018-1421date:2024-11-21T03:59:47.200

SOURCES RELEASE DATE

db:VULHUBid:VHN-124346date:2018-04-04T00:00:00
db:BIDid:103741date:2018-03-27T00:00:00
db:JVNDBid:JVNDB-2018-003762date:2018-06-04T00:00:00
db:CNNVDid:CNNVD-201804-309date:2018-04-04T00:00:00
db:NVDid:CVE-2018-1421date:2018-04-04T18:29:02.217