First published: Thu Mar 09 2023(Updated: )
IBM Security Guardium Key Lifecycle Manager 3.0, 3.0.1, 4.0, 4.1, and 4.1.1could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 247606.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ibm Security Key Lifecycle Manager | =3.0 | |
Ibm Security Key Lifecycle Manager | =3.0.1 | |
Ibm Security Key Lifecycle Manager | =4.0 | |
Ibm Security Key Lifecycle Manager | =4.1 | |
Ibm Security Key Lifecycle Manager | =4.1.1 | |
<=3.0 | ||
<=3.0.1 | ||
<=4.0 | ||
<=4.1 | ||
<=4.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-25688 is a vulnerability in IBM Security Guardium Key Lifecycle Manager that could allow a remote attacker to traverse directories on the system.
The severity of CVE-2023-25688 is medium with a CVSS score of 5.3.
CVE-2023-25688 affects IBM Security Guardium Key Lifecycle Manager versions 3.0, 3.0.1, 4.0, 4.1, and 4.1.1.
A remote attacker can exploit CVE-2023-25688 by sending a specially crafted URL request containing "dot dot" sequences (/../) to traverse directories on the system and view arbitrary files.
Yes, you can find additional information about CVE-2023-25688 at the following references: [IBM X-Force ID: 247606](https://exchange.xforce.ibmcloud.com/vulnerabilities/247606) and [IBM Security Bulletin](https://www.ibm.com/support/pages/node/6962729).