First published: Mon Sep 25 2017(Updated: )
IBM API Connect 5.0.0.0 through 5.0.7.2 could allow an authenticated user to generate an API token when not subscribed to the application plan. IBM X-Force ID: 131545.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
API Connect CLI Plugins | =5.0.0.0 | |
API Connect CLI Plugins | =5.0.0.1 | |
API Connect CLI Plugins | =5.0.1.0 | |
API Connect CLI Plugins | =5.0.2.0 | |
API Connect CLI Plugins | =5.0.3.0 | |
API Connect CLI Plugins | =5.0.4.0 | |
API Connect CLI Plugins | =5.0.5.0 | |
API Connect CLI Plugins | =5.0.6.0 | |
API Connect CLI Plugins | =5.0.6.1 | |
API Connect CLI Plugins | =5.0.6.2 | |
API Connect CLI Plugins | =5.0.6.3 | |
API Connect CLI Plugins | =5.0.6.4 | |
API Connect CLI Plugins | =5.0.7.0 | |
API Connect CLI Plugins | =5.0.7.1 | |
API Connect CLI Plugins | =5.0.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-1555 has a moderate severity rating, indicating that it poses a noteworthy security risk.
To mitigate CVE-2017-1555, upgrade to a version of IBM API Connect that is above 5.0.7.2.
CVE-2017-1555 affects IBM API Connect versions 5.0.0.0 through 5.0.7.2.
CVE-2017-1555 allows an authenticated user to generate an API token without being subscribed to the application plan.
CVE-2017-1555 requires authenticated access, which means it cannot be exploited remotely without valid user credentials.