First published: Fri Oct 05 2018(Updated: )
IBM QRadar Incident Forensics 7.2 and 7.3 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 144655.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Security QRadar Incident Forensics | =7.2.8-patch1 | |
IBM Security QRadar Incident Forensics | =7.2.8-patch13 | |
IBM Security QRadar Incident Forensics | =7.2.8-patch8 | |
IBM Security QRadar Incident Forensics | =7.3.1-patch3 | |
IBM Security QRadar Incident Forensics | =7.3.1-patch4 | |
IBM Security QRadar Incident Forensics | >=7.2.0<=7.2.8 | |
IBM Security QRadar Incident Forensics | >=7.3.0<=7.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1649 is considered to have a medium severity level as it allows directory traversal leading to potential information disclosure.
To fix CVE-2018-1649, apply the latest patches provided by IBM for affected versions of QRadar Incident Forensics.
CVE-2018-1649 affects IBM QRadar Incident Forensics versions 7.2.0 through 7.2.8 and 7.3.0 through 7.3.1.
Yes, CVE-2018-1649 can be exploited remotely by sending specially-crafted URL requests to the affected system.
The potential impacts of CVE-2018-1649 include unauthorized access to sensitive files and data leakage from the affected system.