First published: Wed Feb 01 2017(Updated: )
IBM Sterling B2B Integrator Standard Edition could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM B2B Sterling Integrator | =5.2 | |
IBM B2B Sterling Integrator | =5.2.1 | |
IBM B2B Sterling Integrator | =5.2.2 | |
IBM B2B Sterling Integrator | =5.2.4 | |
IBM B2B Sterling Integrator | =5.2.4.1 | |
IBM B2B Sterling Integrator | =5.2.4.2 | |
IBM B2B Sterling Integrator | =5.2.5 | |
IBM B2B Sterling Integrator | =5.2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-6020 is classified as high due to its potential to facilitate phishing attacks.
To fix CVE-2016-6020, apply the relevant security updates or patches provided by IBM for the affected versions of Sterling B2B Integrator.
CVE-2016-6020 affects IBM Sterling B2B Integrator versions 5.2, 5.2.1, 5.2.2, 5.2.4, 5.2.4.1, 5.2.4.2, 5.2.5, and 5.2.6.
CVE-2016-6020 enables remote attackers to conduct phishing attacks using an open redirect vulnerability.
The primary impact of CVE-2016-6020 is the potential for an attacker to spoof URLs, leading to untrusted site access by users.