First published: Wed Aug 10 2022(Updated: )
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.5, 6.1.0.0 through 6.1.0.4, and 6.1.1.0 through 6.1.1.1 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 215888.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Sterling B2B Integrator | >=6.0.0.0<6.0.3.6 | |
IBM Sterling B2B Integrator | >=6.1.0.0<6.1.0.5 | |
IBM Sterling B2B Integrator | >=6.1.1.0<6.1.1.2 | |
HP HP-UX | ||
IBM AIX | ||
Linux Linux kernel | ||
Microsoft Windows | ||
Oracle Solaris | ||
<=6.0.0.0 - 6.0.3.5 | ||
<=6.1.0.0 - 6.1.0.4 | ||
<=6.1.1.0 - 6.1.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-39085.
The severity of CVE-2021-39085 is critical with a score of 9.8.
IBM Sterling B2B Integrator Standard Edition is affected by CVE-2021-39085.
A remote attacker can exploit CVE-2021-39085 by sending specially crafted SQL statements.
Yes, IBM has released a patch for CVE-2021-39085. You can find it at the following URL: [Patch URL](http://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~Other%2Bsoftware&product=ibm/Other+software/Sterling+B2B+Integrator&release=All&platform=All&function=all).