First published: Sat Jul 02 2016(Updated: )
Directory traversal vulnerability in IBM Security QRadar SIEM 7.2.x before 7.2.7 and QRadar Incident Forensics 7.2.x before 7.2.7 allows remote attackers to read arbitrary files via a crafted URL.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM QRadar Security Information and Event Manager | =7.2.0 | |
IBM QRadar Security Information and Event Manager | =7.2.1 | |
IBM QRadar Security Information and Event Manager | =7.2.2 | |
IBM QRadar Security Information and Event Manager | =7.2.3 | |
IBM QRadar Security Information and Event Manager | =7.2.4 | |
IBM QRadar Security Information and Event Manager | =7.2.5 | |
IBM QRadar Security Information and Event Manager | =7.2.6 | |
IBM Security QRadar Incident Forensics | =7.2.0 | |
IBM Security QRadar Incident Forensics | =7.2.1 | |
IBM Security QRadar Incident Forensics | =7.2.2 | |
IBM Security QRadar Incident Forensics | =7.2.3 | |
IBM Security QRadar Incident Forensics | =7.2.4 | |
IBM Security QRadar Incident Forensics | =7.2.5 | |
IBM Security QRadar Incident Forensics | =7.2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2872 is rated as a medium severity vulnerability, allowing unauthorized file access.
To fix CVE-2016-2872, upgrade to IBM Security QRadar SIEM version 7.2.7 or later.
CVE-2016-2872 affects IBM Security QRadar SIEM versions 7.2.0 through 7.2.6 and QRadar Incident Forensics versions 7.2.0 through 7.2.6.
Yes, CVE-2016-2872 can be exploited remotely via crafted URLs by attackers.
CVE-2016-2872 allows attackers to read arbitrary files on the affected systems, potentially leading to sensitive information disclosure.