First published: Tue Mar 07 2017(Updated: )
IBM Business Process Manager 7.5, 8.0, and 8.5 has a file download capability that is vulnerable to a set of attacks. Ultimately, an attacker can cause an unauthenticated victim to download a malicious payload. An existing file type restriction can be bypassed so that the payload might be considered executable and cause damage on the victim's machine. IBM Reference #: 1998655.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Business Process Manager | =7.5.0.0 | |
IBM Business Process Manager | =7.5.0.0 | |
IBM Business Process Manager | =7.5.0.0 | |
IBM Business Process Manager | =7.5.0.0 | |
IBM Business Process Manager | =7.5.0.1 | |
IBM Business Process Manager | =7.5.0.1 | |
IBM Business Process Manager | =7.5.0.1 | |
IBM Business Process Manager | =7.5.0.1 | |
IBM Business Process Manager | =7.5.1.0 | |
IBM Business Process Manager | =7.5.1.0 | |
IBM Business Process Manager | =7.5.1.0 | |
IBM Business Process Manager | =7.5.1.0 | |
IBM Business Process Manager | =7.5.1.1 | |
IBM Business Process Manager | =7.5.1.1 | |
IBM Business Process Manager | =7.5.1.1 | |
IBM Business Process Manager | =7.5.1.1 | |
IBM Business Process Manager | =7.5.1.2 | |
IBM Business Process Manager | =7.5.1.2 | |
IBM Business Process Manager | =7.5.1.2 | |
IBM Business Process Manager | =7.5.1.2 | |
IBM Business Process Manager | =8.0.0.0 | |
IBM Business Process Manager | =8.0.0.0 | |
IBM Business Process Manager | =8.0.0.0 | |
IBM Business Process Manager | =8.0.0.0 | |
IBM Business Process Manager | =8.0.1.0 | |
IBM Business Process Manager | =8.0.1.0 | |
IBM Business Process Manager | =8.0.1.0 | |
IBM Business Process Manager | =8.0.1.0 | |
IBM Business Process Manager | =8.0.1.1 | |
IBM Business Process Manager | =8.0.1.1 | |
IBM Business Process Manager | =8.0.1.1 | |
IBM Business Process Manager | =8.0.1.1 | |
IBM Business Process Manager | =8.0.1.2 | |
IBM Business Process Manager | =8.0.1.2 | |
IBM Business Process Manager | =8.0.1.2 | |
IBM Business Process Manager | =8.0.1.2 | |
IBM Business Process Manager | =8.0.1.3 | |
IBM Business Process Manager | =8.0.1.3 | |
IBM Business Process Manager | =8.0.1.3 | |
IBM Business Process Manager | =8.0.1.3 | |
IBM Business Process Manager | =8.5.0.0 | |
IBM Business Process Manager | =8.5.0.0 | |
IBM Business Process Manager | =8.5.0.0 | |
IBM Business Process Manager | =8.5.0.0 | |
IBM Business Process Manager | =8.5.0.1 | |
IBM Business Process Manager | =8.5.0.1 | |
IBM Business Process Manager | =8.5.0.1 | |
IBM Business Process Manager | =8.5.0.1 | |
IBM Business Process Manager | =8.5.0.2 | |
IBM Business Process Manager | =8.5.0.2 | |
IBM Business Process Manager | =8.5.0.2 | |
IBM Business Process Manager | =8.5.0.2 | |
IBM Business Process Manager | =8.5.5.0 | |
IBM Business Process Manager | =8.5.5.0 | |
IBM Business Process Manager | =8.5.5.0 | |
IBM Business Process Manager | =8.5.5.0 | |
IBM Business Process Manager | =8.5.6.0 | |
IBM Business Process Manager | =8.5.6.0 | |
IBM Business Process Manager | =8.5.6.0 | |
IBM Business Process Manager | =8.5.6.0 | |
IBM Business Process Manager | =8.5.6.2 | |
IBM Business Process Manager | =8.5.6.2 | |
IBM Business Process Manager | =8.5.6.2 | |
IBM Business Process Manager | =8.5.6.2 | |
IBM Business Process Manager | =8.5.7.0 | |
IBM Business Process Manager | =8.5.7.0 | |
IBM Business Process Manager | =8.5.7.0 | |
IBM Business Process Manager | =8.5.7.0 | |
IBM WebSphere | =7.2 | |
IBM WebSphere | =7.2.0.1 | |
IBM WebSphere | =7.2.0.2 | |
IBM WebSphere | =7.2.0.3 | |
IBM WebSphere | =7.2.0.4 | |
IBM WebSphere | =7.2.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9693 has a medium severity rating, allowing an attacker to trick users into downloading malicious files.
To fix CVE-2016-9693, it is recommended to apply the latest patches provided by IBM for the affected versions of the Business Process Manager.
CVE-2016-9693 affects IBM Business Process Manager versions 7.5, 8.0, and 8.5.
Yes, CVE-2016-9693 can be exploited remotely, allowing attackers to perform unauthorized actions on a vulnerable system.
No, CVE-2016-9693 can be exploited by an unauthenticated user, making it critical to address promptly.