First published: Wed Dec 06 2023(Updated: )
IBM Security Guardium Key Lifecycle Manager 4.3 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view modify files on the system. IBM X-Force ID: 271196.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Security Guardium Key Lifecycle Manager | <=4.2 | |
All of | ||
IBM Security Guardium Key Lifecycle Manager | >=4.2.0<4.2.0.2 | |
Any of | ||
IBM AIX | ||
Linux Kernel | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-47702 is classified as high due to the potential for remote directory traversal vulnerabilities.
To fix CVE-2023-47702, apply the appropriate patch from IBM for the Security Guardium Key Lifecycle Manager software.
CVE-2023-47702 affects IBM Security Guardium Key Lifecycle Manager versions up to 4.2.0.2.
Yes, CVE-2023-47702 allows attackers to exploit directory traversal techniques to access unauthorized files on the system.
CVE-2023-47702 was disclosed as part of IBM's security advisories regarding vulnerabilities in their software products.