CVE-2022-38754 – CVE-2022-38754 - Micro Focus Operations Bridge Manager and OpsBridge Containerized - Cross Site Scripting (XSS)
https://notcve.org/view.php?id=CVE-2022-38754
A potential vulnerability has been identified in Micro Focus Operations Bridge - Containerized. The vulnerability could be exploited by a malicious authenticated OBM (Operations Bridge Manager) user to run Java Scripts in the browser context of another OBM user. Please note: The vulnerability is only applicable if the Operations Bridge Manager capability is deployed. A potential vulnerability has been identified in Micro Focus Operations Bridge Manager (OBM). The vulnerability could be exploited by a malicious authenticated OBM user to run Java Scripts in the browser context of another OBM user. • https://marketplace.microfocus.com/itom/content/operations-bridge-manager-obm-2022-05-hotfixes https://portal.microfocus.com/s/article/KM000012517?language=en_US https://portal.microfocus.com/s/article/KM000012518?language=en_US • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2021-38125
https://notcve.org/view.php?id=CVE-2021-38125
Unauthenticated remote code execution in Micro Focus Operations Bridge containerized, affecting versions 2021.05, 2021.08, and newer versions of Micro Focus Operations Bridge containerized if the deployment was upgraded from 2021.05 or 2021.08. The vulnerability could be exploited to unauthenticated remote code execution. Una Ejecución de código remoto no autenticado en Micro Focus Operations Bridge en contenedor, afectando a versiones 2021.05, 2021.08 y versiones más recientes de Micro Focus Operations Bridge en contenedor si la implantación fue actualizada desde 2021.05 o 2021.08. La vulnerabilidad podría aprovecharse para una ejecución de código remota sin autenticación • https://portal.microfocus.com/s/article/KM000005303?language=en_US •
CVE-2021-22507
https://notcve.org/view.php?id=CVE-2021-22507
Authentication bypass vulnerability in Micro Focus Operations Bridge Manager affects versions 2019.05, 2019.11, 2020.05 and 2020.10. The vulnerability could allow remote attackers to bypass user authentication and get unauthorized access. Una vulnerabilidad de omisión de autenticación en Micro Focus Operations Bridge Manager afecta a las versiones 2019.05, 2019.11, 2020.05 y 2020.10. La vulnerabilidad podría permitir a atacantes remotos omitir la autenticación de usuarios y obtener acceso no autorizado • https://softwaresupport.softwaregrp.com/doc/KM03793283 • CWE-287: Improper Authentication •
CVE-2021-22504
https://notcve.org/view.php?id=CVE-2021-22504
Arbitrary code execution vulnerability on Micro Focus Operations Bridge Manager product, affecting versions 10.1x, 10.6x, 2018.05, 2018.11, 2019.05, 2019.11, 2020.05, 2020.10. The vulnerability could allow remote attackers to execute arbitrary code on an OBM server. Una vulnerabilidad de ejecución de código arbitraria en el producto Micro Focus Operations Bridge Manager, afectan a versiones 10.1x, 10.6x, 2018.05, 2018.11, 2019.05, 2019.11, 2020.05, 2020.10. La vulnerabilidad podría permitir a atacantes remotos ejecutar código arbitrario en un servidor OBM • https://softwaresupport.softwaregrp.com/doc/KM03777855 •
CVE-2020-11858 – Code execution with escalated privilegesn vlnerability in Operation bridge Manager and Operations Bridge (containerized) products.
https://notcve.org/view.php?id=CVE-2020-11858
Code execution with escalated privileges vulnerability in Micro Focus products Operation Bridge Manager and Operation Bridge (containerized). The vulneravility affects: 1.) Operation Bridge Manager versions: 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, 10.63,10.62, 10.61, 10.60, 10.12, 10.11, 10.10 and all earlier versions. 2.) Operations Bridge (containerized) versions: 2020.05, 2019.08, 2019.05, 2018.11, 2018.08, 2018.05. 2018.02 and 2017.11. The vulnerability could allow local attackers to execute code with escalated privileges. • http://packetstormsecurity.com/files/161411/Micro-Focus-Operations-Bridge-Manager-Local-Privilege-Escalation.html https://softwaresupport.softwaregrp.com/doc/KM03747658 https://softwaresupport.softwaregrp.com/doc/KM03747854 https://www.zerodayinitiative.com/advisories/ZDI-20-1326 •