Vulnerability Name: | CVE-2020-4294 (CCN-176404) | ||||||||||||
Assigned: | 2019-12-30 | ||||||||||||
Published: | 2020-04-14 | ||||||||||||
Updated: | 2022-06-29 | ||||||||||||
Summary: | IBM QRadar 7.3.0 to 7.3.3 Patch 2 is vulnerable to Server Side Request Forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. IBM X-ForceID: 176404. | ||||||||||||
CVSS v3 Severity: | 6.3 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) 5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 6.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-918 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-4294 Source: MISC Type: Exploit, Third Party Advisory, VDB Entry http://packetstormsecurity.com/files/157329/QRadar-Community-Edition-7.3.1.6-Server-Side-Request-Forgery.html Source: FULLDISC Type: Exploit, Mailing List, Third Party Advisory 20200421 QRadar RssFeedItem Server-Side Request Forgery vulnerability Source: XF Type: UNKNOWN ibm-qradar-cve20204294-ssrf(176404) Source: XF Type: VDB Entry, Vendor Advisory ibm-qradar-cve20204294-ssrf (176404) Source: CCN Type: Packet Storm Security [04-21-2020] QRadar Community Edition 7.3.1.6 Server Side Request Forgery Source: CCN Type: IBM Security Bulletin 6189663 (Qradar) IBM QRadar SIEM is vulnerable to Server-Side Request Forgery (SSRF) (CVE-2020-4294) Source: CONFIRM Type: Vendor Advisory https://www.ibm.com/support/pages/node/6189663 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||
BACK |