First published: Mon Jul 04 2022(Updated: )
IBM Sterling Partner Engagement Manager 6.1.2, 6.2, and Cloud/SasS 22.2 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. IBM X-Force ID: 223126.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Partner Engagement Manager | >=6.1.2<6.1.2.5 | |
IBM Partner Engagement Manager | >=6.1.2<6.1.2.5 | |
IBM Partner Engagement Manager | >=6.2.0<6.2.0.3 | |
IBM Partner Engagement Manager | >=6.2.0<6.2.0.3 | |
Ibm Partner Engagement Manager On Cloud\/saas | =22.2 | |
IBM Sterling Partner Engagement Manager Essentials Edition | <=6.1.2 | |
IBM Sterling Partner Engagement Manager Standard Edition | <=6.1.2 | |
IBM Sterling Partner Engagement Manager Essentials Edition | <=6.2 | |
IBM Sterling Partner Engagement Manager Standard Edition | <=6.2 | |
IBM Sterling Partner Engagement Manager on Cloud / SaaS | <=22.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-22416 refers to a vulnerability in IBM Sterling Partner Engagement Manager that allows an authenticated attacker to perform server-side request forgery (SSRF) attacks.
CVE-2022-22416 affects IBM Sterling Partner Engagement Manager versions 6.1.2, 6.2, and Cloud/SaaS 22.2, allowing an attacker to send unauthorized requests from the system.
CVE-2022-22416 has a severity level of medium, with a CVSS score of 5.4.
To fix CVE-2022-22416, apply the relevant patches provided by IBM.
You can find more information about CVE-2022-22416 on the IBM X-Force Exchange and IBM Support pages.