First published: Wed Apr 13 2022(Updated: )
IBM Robotic Process Automation 21.0.1 and 21.0.2 is vulnerable to External Service Interaction attack, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability to induce the application to perform server-side DNS lookups or HTTP requests to arbitrary domain names. By submitting suitable payloads, an attacker can cause the application server to attack other systems that it can interact with. IBM X-Force ID: 224156.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Robotic Process Automation | <21.0.1.5 | |
IBM Robotic Process Automation | =21.0.2 | |
IBM Robotic Process Automation as a Service | ||
Microsoft Windows | ||
<=< 21.0.2.1 | ||
<=< 21.0.1.5 | ||
<=All |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-22433 has a medium severity rating, allowing remote attackers to perform unauthorized actions.
To fix CVE-2022-22433, upgrade IBM Robotic Process Automation to version 21.0.2.1 or later if using version 21.0.2, and to version 21.0.1.5 or later if on version 21.0.1.
CVE-2022-22433 affects IBM Robotic Process Automation versions prior to 21.0.2.1 and 21.0.1.5 as well as all versions of the as-a-Service offering.
CVE-2022-22433 is associated with External Service Interaction attacks due to improper validation of user-supplied input.
Yes, CVE-2022-22433 can potentially lead to data breaches by allowing attackers to make unauthorized DNS lookups or HTTP requests.