First published: Tue Jun 27 2017(Updated: )
IBM API Connect 5.0.0.0 - 5.0.6.0 could allow a remote attacker to bypass security restrictions of the api, caused by improper handling of security policy. By crafting a suitable request, an attacker could exploit this vulnerability to bypass security and use the vulnerable API. IBM X-Force ID: 126230.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
API Connect CLI Plugins | =5.0.0.0 | |
API Connect CLI Plugins | =5.0.0.1 | |
API Connect CLI Plugins | =5.0.1.0 | |
API Connect CLI Plugins | =5.0.2.0 | |
API Connect CLI Plugins | =5.0.3.0 | |
API Connect CLI Plugins | =5.0.4.0 | |
API Connect CLI Plugins | =5.0.5.0 | |
API Connect CLI Plugins | =5.0.6.0 | |
API Connect CLI Plugins | =5.0.6.1 | |
API Connect CLI Plugins | =5.0.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-1328 is considered a medium severity vulnerability that allows remote attackers to bypass security restrictions.
IBM API Connect versions 5.0.0.0 through 5.0.6.0 are affected by CVE-2017-1328.
To fix CVE-2017-1328, upgrade to the latest version of IBM API Connect that addresses the vulnerability.
CVE-2017-1328 can be exploited by crafting specific requests to bypass security policies of the affected API.
CVE-2017-1328 potentially allows unauthorized access and manipulation of APIs, severely compromising API security.