First published: Fri Oct 25 2013(Updated: )
IBM Security AppScan Enterprise 8.x before 8.8 sends a cleartext AppScan Source database password in a response, which allows remote authenticated users to obtain sensitive information, and subsequently conduct man-in-the-middle attacks, by examining the response content.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Security AppScan | =8.0.0.0 | |
IBM Security AppScan | =8.0.0.1 | |
IBM Security AppScan | =8.0.0.2 | |
IBM Security AppScan | =8.0.1.0 | |
IBM Security AppScan | =8.0.1.1 | |
IBM Security AppScan | =8.0.11 | |
IBM Security AppScan | =8.5.0.0 | |
IBM Security AppScan | =8.5.0.1 | |
IBM Security AppScan | =8.6.0.0 | |
IBM Security AppScan | =8.6.0.1 | |
IBM Security AppScan | =8.6.0.2 | |
IBM Security AppScan | =8.7.0.0 | |
IBM Security AppScan | =8.7.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-3989 is considered a high severity vulnerability due to the potential risk of remote authenticated users accessing sensitive information.
To fix CVE-2013-3989, upgrade IBM Security AppScan Enterprise to version 8.8 or later.
CVE-2013-3989 affects IBM Security AppScan Enterprise versions 8.0.0.0 through 8.7.0.1.
CVE-2013-3989 can be exploited to conduct man-in-the-middle attacks by capturing the cleartext AppScan Source database password.
CVE-2013-3989 allows the exposure of the AppScan Source database password in cleartext within responses.