First published: Mon May 17 2021(Updated: )
IBM Security Access Manager Docker could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Security Verify Access | =10.0.0 | |
Docker Docker | ||
<=10.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-20534.
The severity level of CVE-2021-20534 is medium.
CVE-2021-20534 allows for phishing attacks by using an open redirect attack.
IBM Security Verify Access Docker 10.0.0 is affected by CVE-2021-20534.
There currently is no fix available for the vulnerability in IBM Security Access Manager Docker. It is recommended to apply any patches or updates provided by the vendor when they become available.