// For flags

CVE-2013-2994

 

Severity Score

6.4
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

IBM WebSphere Commerce 7.0 Feature Pack 4 and Feature Pack 5 incorrectly maintains a valid session after unspecified interaction with REST services, which allows remote attackers to issue REST requests in the context of an arbitrary user's active session via unknown vectors.

IBM WebSphere Commerce 7.0 Feature Pack 4 y Feature Pack 5, mantiene incorrectamente una sesión válida tras una interacción sin especificar con los servicios REST, lo que permite a atacantes remotos emitir peticiones REST en el contexto de una sesión de un usuario arbitrario, a través de vectores no especificados.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2013-04-12 CVE Reserved
  • 2013-07-31 CVE Published
  • 2023-03-07 EPSS Updated
  • 2024-08-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Ibm
Search vendor "Ibm"
Websphere Commerce
Search vendor "Ibm" for product "Websphere Commerce"
7.0
Search vendor "Ibm" for product "Websphere Commerce" and version "7.0"
feature_pack4
Affected
Ibm
Search vendor "Ibm"
Websphere Commerce
Search vendor "Ibm" for product "Websphere Commerce"
7.0
Search vendor "Ibm" for product "Websphere Commerce" and version "7.0"
feature_pack5
Affected