First published: Tue Feb 02 2021(Updated: )
Certain IBM API Connect 10.0.0.0 through 10.0.1.0 and 2018.4.1.0 through 2018.4.1.13 configurations can result in sensitive information in the URL fragment identifiers. This information can be cached in the intermediate nodes like proxy servers, cdn, logging platforms, etc. An attacker can make use of this information to perform attacks by impersonating a user. IBM X-Force ID: 185510.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM API Connect | >=2018.4.1.0<=2018.4.1.13 | |
IBM API Connect | =10.0.0.0 | |
IBM API Connect | =10.0.1.0 | |
<=API Connect V10.0.1.0 | ||
<=V2018.4.1.0-2018.4.1.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2020-4640.
CVE-2020-4640 has a severity value of 4.1, which is considered medium.
The affected software is IBM API Connect versions 10.0.0.0 through 10.0.1.0 and versions 2018.4.1.0 through 2018.4.1.13.
This vulnerability can result in sensitive information being exposed in the URL fragment identifiers and cached in intermediate nodes like proxy servers, CDN, and logging platforms.
You can apply the patch provided by IBM to fix CVE-2020-4640. The patch can be found at the following link: http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm%7EWebSphere&product=ibm/WebSphere/IBM+API+Connect&release=2018.4.1.13&platform=All&function=all&source=fc