First published: Tue Jan 09 2018(Updated: )
IBM UrbanCode Deploy (UCD) 6.1 and 6.2 could allow an authenticated user to edit objects that they should not have access to due to improper access controls. IBM X-Force ID: 128691.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM UrbanCode Deploy | =6.1 | |
IBM UrbanCode Deploy | =6.1.0.1 | |
IBM UrbanCode Deploy | =6.1.0.3 | |
IBM UrbanCode Deploy | =6.1.0.4 | |
IBM UrbanCode Deploy | =6.1.1.0 | |
IBM UrbanCode Deploy | =6.1.1.1 | |
IBM UrbanCode Deploy | =6.1.1.2 | |
IBM UrbanCode Deploy | =6.1.1.3 | |
IBM UrbanCode Deploy | =6.1.1.4 | |
IBM UrbanCode Deploy | =6.1.1.5 | |
IBM UrbanCode Deploy | =6.1.1.6 | |
IBM UrbanCode Deploy | =6.1.1.7 | |
IBM UrbanCode Deploy | =6.1.1.8 | |
IBM UrbanCode Deploy | =6.1.2 | |
IBM UrbanCode Deploy | =6.1.3 | |
IBM UrbanCode Deploy | =6.1.3.1 | |
IBM UrbanCode Deploy | =6.1.3.2 | |
IBM UrbanCode Deploy | =6.1.3.3 | |
IBM UrbanCode Deploy | =6.1.3.4 | |
IBM UrbanCode Deploy | =6.1.3.5 | |
IBM UrbanCode Deploy | =6.1.3.6 | |
IBM UrbanCode Deploy | =6.2.0.0 | |
IBM UrbanCode Deploy | =6.2.0.1 | |
IBM UrbanCode Deploy | =6.2.0.2 | |
IBM UrbanCode Deploy | =6.2.0.201 | |
IBM UrbanCode Deploy | =6.2.1.0 | |
IBM UrbanCode Deploy | =6.2.1.1 | |
IBM UrbanCode Deploy | =6.2.1.2 | |
IBM UrbanCode Deploy | =6.2.2.0 | |
IBM UrbanCode Deploy | =6.2.2.1 | |
IBM UrbanCode Deploy | =6.2.3.0 | |
IBM UrbanCode Deploy | =6.2.3.1 | |
IBM UrbanCode Deploy | =6.2.4.0 | |
IBM UrbanCode Deploy | =6.2.4.1 | |
IBM UrbanCode Deploy | =6.2.4.2 | |
IBM UrbanCode Deploy | =6.2.5.0 | |
IBM UrbanCode Deploy | =6.2.5.1 | |
IBM UrbanCode Deploy | =6.2.5.2 | |
IBM UrbanCode Deploy | =6.2.6.0 | |
IBM UrbanCode Deploy | =6.2.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2017-1493.
The severity of CVE-2017-1493 is medium.
Versions 6.1 to 6.2.6.1 of IBM UrbanCode Deploy are affected by this vulnerability.
This vulnerability allows an authenticated user to edit objects that they should not have access to due to improper access controls.
Yes, you can find more information about this vulnerability at the following links: [Link 1](http://www.ibm.com/support/docview.wss?uid=swg2C1000367), [Link 2](http://www.securityfocus.com/bid/102483), [Link 3](https://exchange.xforce.ibmcloud.com/vulnerabilities/128691).