First published: Mon Jan 09 2023(Updated: )
IBM Sterling Partner Engagement Manager 6.1, 6.2, and 6.2.1 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 236208.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Sterling Partner Engagement Manager | =6.1.2 | |
IBM Sterling Partner Engagement Manager | =6.2.0 | |
IBM Sterling Partner Engagement Manager | =6.2.1 | |
Linux Linux kernel | ||
<=6.1.2, 6.2.0, 6.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-40615 is critical with a CVSS score of 9.8.
IBM Sterling Partner Engagement Manager versions 6.1.2, 6.2.0, and 6.2.1 are affected by CVE-2022-40615.
CVE-2022-40615 allows a remote attacker to send specially crafted SQL statements, leading to SQL injection vulnerabilities that could allow unauthorized access to and manipulation of the back-end database of IBM Sterling Partner Engagement Manager.
As of now, there are no known workarounds for CVE-2022-40615. It is recommended to apply the official patches or updates provided by IBM to mitigate the vulnerability.
You can find more information about CVE-2022-40615 on the IBM X-Force Exchange website (https://exchange.xforce.ibmcloud.com/vulnerabilities/236208) and in the IBM support page (https://www.ibm.com/support/pages/node/6854333).