First published: Wed Feb 01 2017(Updated: )
IBM Security Access Manager for Web stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referer header or browser history.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Security Access Manager Appliance | =9.0.0 | |
IBM Security Access Manager Appliance | =9.0.0.1 | |
IBM Security Access Manager Appliance | =9.0.1.0 | |
IBM Security Access Manager for Mobile | =8.0.0.0 | |
IBM Security Access Manager for Mobile | =8.0.0.5 | |
IBM Security Access Manager for Mobile | =8.0.1 | |
IBM Security Access Manager for Mobile | =8.0.1.2 | |
IBM Security Access Manager for Mobile | =8.0.1.3 | |
IBM Security Access Manager for Mobile | =8.0.1.4 | |
IBM Security Access Manager | =7.0.0 | |
IBM Security Access Manager | =8.0.0 | |
IBM Security Access Manager | =8.0.1 | |
IBM Security Access Manager | =8.0.1.1 | |
IBM Security Access Manager | =8.0.1.2 | |
IBM Security Access Manager | =8.0.1.3 | |
IBM Security Access Manager | =8.0.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3045 is rated as a medium severity vulnerability due to potential information disclosure risks.
To fix CVE-2016-3045, ensure that sensitive information is not transmitted via URL parameters and implement access controls for server logs.
CVE-2016-3045 affects multiple versions of IBM Security Access Manager for Web and IBM Security Access Manager for Mobile.
The potential risks of CVE-2016-3045 include unauthorized access to sensitive information through server logs, referer headers, or browser history.
A possible workaround for CVE-2016-3045 is to avoid using URL parameters for sensitive information and promote secure coding practices.