Vulnerability Name:

CVE-2014-0888 (CCN-91239)

Assigned:2014-08-26
Published:2014-08-26
Updated:2017-08-29
Summary:IBM Worklight Foundation 5.x and 6.x before 6.2.0.0, as used in Worklight and Mobile Foundation, allows remote authenticated users to bypass the application-authenticity feature via unspecified vectors.
CVSS v3 Severity:2.6 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): Low
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:4.9 Medium (CVSS v2 Vector: AV:N/AC:M/Au:S/C:N/I:P/A:P)
3.6 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:S/C:N/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): Partial
3.5 Low (CCN CVSS v2 Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N)
2.6 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-264
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2014-0888

Source: CCN
Type: IBM Security Bulletin 1682798
IBM Worklight and IBM Mobile Foundation application authenticity bypass (CVE-2014-0888)

Source: CONFIRM
Type: Vendor Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21682798

Source: CCN
Type: BID-69459
IBM Worklight and IBM Mobile Foundation CVE-2014-0888 Authentication Bypass Vulnerability

Source: XF
Type: UNKNOWN
ibm-worklight-cve20140888(91239)

Source: XF
Type: UNKNOWN
ibm-worklight-cve20140888-tamper(91239)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:ibm:worklight:5.0.0.0:*:*:*:consumer:*:*:*
  • OR cpe:/a:ibm:worklight:5.0.0.0:*:*:*:enterprise:*:*:*
  • OR cpe:/a:ibm:worklight:5.0.0.1:*:*:*:consumer:*:*:*
  • OR cpe:/a:ibm:worklight:5.0.0.1:*:*:*:enterprise:*:*:*
  • OR cpe:/a:ibm:worklight:5.0.0.2:*:*:*:consumer:*:*:*
  • OR cpe:/a:ibm:worklight:5.0.0.2:*:*:*:enterprise:*:*:*
  • OR cpe:/a:ibm:worklight:5.0.0.3:*:*:*:consumer:*:*:*
  • OR cpe:/a:ibm:worklight:5.0.0.3:*:*:*:enterprise:*:*:*
  • OR cpe:/a:ibm:worklight:5.0.5.0:*:*:*:consumer:*:*:*
  • OR cpe:/a:ibm:worklight:5.0.5.0:*:*:*:enterprise:*:*:*
  • OR cpe:/a:ibm:worklight:5.0.5.1:*:*:*:consumer:*:*:*
  • OR cpe:/a:ibm:worklight:5.0.5.1:*:*:*:enterprise:*:*:*
  • OR cpe:/a:ibm:worklight:5.0.6.0:*:*:*:consumer:*:*:*
  • OR cpe:/a:ibm:worklight:5.0.6.0:*:*:*:enterprise:*:*:*
  • OR cpe:/a:ibm:worklight:5.0.6.1:*:*:*:consumer:*:*:*
  • OR cpe:/a:ibm:worklight:5.0.6.1:*:*:*:enterprise:*:*:*
  • OR cpe:/a:ibm:worklight:5.0.6.2:*:*:*:consumer:*:*:*
  • OR cpe:/a:ibm:worklight:5.0.6.2:*:*:*:enterprise:*:*:*
  • OR cpe:/a:ibm:worklight:6.0.0.0:*:*:*:consumer:*:*:*
  • OR cpe:/a:ibm:worklight:6.0.0.0:*:*:*:enterprise:*:*:*
  • OR cpe:/a:ibm:worklight:6.0.0.1:*:*:*:consumer:*:*:*
  • OR cpe:/a:ibm:worklight:6.0.0.1:*:*:*:enterprise:*:*:*
  • OR cpe:/a:ibm:worklight:6.0.0.2:*:*:*:consumer:*:*:*
  • OR cpe:/a:ibm:worklight:6.0.0.2:*:*:*:enterprise:*:*:*
  • OR cpe:/a:ibm:worklight:6.1.0.0:*:*:*:consumer:*:*:*
  • OR cpe:/a:ibm:worklight:6.1.0.0:*:*:*:enterprise:*:*:*
  • OR cpe:/a:ibm:worklight:6.1.0.1:*:*:*:consumer:*:*:*
  • OR cpe:/a:ibm:worklight:6.1.0.1:*:*:*:enterprise:*:*:*

  • Configuration 2:
  • cpe:/a:ibm:mobile_foundation:5.0.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:mobile_foundation:5.0.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:mobile_foundation:5.0.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:mobile_foundation:5.0.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:mobile_foundation:5.0.5.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:mobile_foundation:5.0.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:mobile_foundation:5.0.6.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:mobile_foundation:5.0.6.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:mobile_foundation:5.0.6.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:mobile_foundation:6.0.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:mobile_foundation:6.0.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:mobile_foundation:6.0.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:mobile_foundation:6.1.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:mobile_foundation:6.1.0.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    ibm worklight 5.0.0.0
    ibm worklight 5.0.0.0
    ibm worklight 5.0.0.1
    ibm worklight 5.0.0.1
    ibm worklight 5.0.0.2
    ibm worklight 5.0.0.2
    ibm worklight 5.0.0.3
    ibm worklight 5.0.0.3
    ibm worklight 5.0.5.0
    ibm worklight 5.0.5.0
    ibm worklight 5.0.5.1
    ibm worklight 5.0.5.1
    ibm worklight 5.0.6.0
    ibm worklight 5.0.6.0
    ibm worklight 5.0.6.1
    ibm worklight 5.0.6.1
    ibm worklight 5.0.6.2
    ibm worklight 5.0.6.2
    ibm worklight 6.0.0.0
    ibm worklight 6.0.0.0
    ibm worklight 6.0.0.1
    ibm worklight 6.0.0.1
    ibm worklight 6.0.0.2
    ibm worklight 6.0.0.2
    ibm worklight 6.1.0.0
    ibm worklight 6.1.0.0
    ibm worklight 6.1.0.1
    ibm worklight 6.1.0.1
    ibm mobile foundation 5.0.0.0
    ibm mobile foundation 5.0.0.1
    ibm mobile foundation 5.0.0.2
    ibm mobile foundation 5.0.0.3
    ibm mobile foundation 5.0.5.0
    ibm mobile foundation 5.0.5.1
    ibm mobile foundation 5.0.6.0
    ibm mobile foundation 5.0.6.1
    ibm mobile foundation 5.0.6.2
    ibm mobile foundation 6.0.0.0
    ibm mobile foundation 6.0.0.1
    ibm mobile foundation 6.0.0.2
    ibm mobile foundation 6.1.0.0
    ibm mobile foundation 6.1.0.1