First published: Sun Jan 03 2016(Updated: )
The portal in IBM Tivoli Monitoring (ITM) 6.2.2 through FP9, 6.2.3 through FP5, and 6.3.0 before FP7 allows remote authenticated users to execute arbitrary commands by leveraging Take Action view authority and providing crafted input.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Tivoli Monitoring | =6.2.2 | |
IBM Tivoli Monitoring | =6.2.3 | |
IBM Tivoli Monitoring | =6.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5003 is considered a high severity vulnerability due to its potential for remote command execution.
To mitigate CVE-2015-5003, update IBM Tivoli Monitoring to version 6.3.0 FP7 or later.
CVE-2015-5003 affects users of IBM Tivoli Monitoring versions 6.2.2 through FP9, 6.2.3 through FP5, and 6.3.0 before FP7.
CVE-2015-5003 is classified as an authentication-related remote command execution vulnerability.
No, CVE-2015-5003 can only be exploited by remote authenticated users with Take Action view authority.