First published: Wed Feb 23 2022(Updated: )
IBM Sterling External Authentication Server 3.4.3.2, 6.0.2.0, and 6.0.3.0 is vulnerable to path traversals, due to not properly validating RESTAPI configuration data. An authorized user could import invalid data which could be used for an attack. IBM X-Force ID: 220144.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Sterling External Authentication Server | =3.4.3.2 | |
IBM Sterling External Authentication Server | =6.0.2.0 | |
IBM Sterling External Authentication Server | =6.0.3.0 | |
IBM Sterling External Authentication Server | <=6.0.3 | |
IBM Sterling External Authentication Server | <=6.0.2 | |
IBM Sterling External Authentication Server | <=3.4.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-22349 is medium with a severity value of 4.3.
IBM Sterling External Authentication Server versions 3.4.3.2, 6.0.2.0, and 6.0.3.0 are affected by CVE-2022-22349.
An authorized user could import invalid data through the RESTAPI configuration, allowing for path traversals and potential attacks.
The CWE for CVE-2022-22349 is CWE-22.
You can patch the affected versions of IBM Sterling External Authentication Server. Please refer to the vendor's support page for the respective version.