First published: Sun Nov 08 2015(Updated: )
IBM Security QRadar Incident Forensics 7.2.x before 7.2.5 Patch 5 places session IDs in https URLs, which allows remote attackers to obtain sensitive information by reading (1) web-server access logs, (2) web-server Referer logs, or (3) the browser history.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM QRadar Incident Forensics | =7.2.0 | |
IBM QRadar Incident Forensics | =7.2.1 | |
IBM QRadar Incident Forensics | =7.2.2 | |
IBM QRadar Incident Forensics | =7.2.3 | |
IBM QRadar Incident Forensics | =7.2.4 | |
IBM QRadar Incident Forensics | =7.2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1999 has a medium severity rating due to its potential impact on sensitive information disclosure.
To fix CVE-2015-1999, upgrade IBM Security QRadar Incident Forensics to version 7.2.5 Patch 5 or later.
Versions 7.2.0 through 7.2.4 of IBM Security QRadar Incident Forensics are affected by CVE-2015-1999.
Not addressing CVE-2015-1999 could allow attackers to capture sensitive session IDs via web-server logs and browser history.
Yes, CVE-2015-1999 can be exploited remotely by attackers who can access the relevant web server logs.