CVE-2020-4294
QRadar Community Edition 7.3.1.6 Server Side Request Forgery
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
IBM QRadar 7.3.0 to 7.3.3 Patch 2 is vulnerable to Server Side Request Forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. IBM X-ForceID: 176404.
IBM QRadar versiones 7.3.0 hasta 7.3.3, Parche 2, es vulnerable a un ataque de tipo Server Side Request Forgery (SSRF). Esto puede permitir a un atacante autenticado enviar peticiones no autorizadas del sistema, conllevando a una enumeraciĆ³n de la red o facilitar otros ataques. IBM X-ForceID: 176404.
QRadar Community Edition version 7.3.1.6 has an issue where the RssFeedItem class of the QRadar web application is used to fetch and parse RSS feeds. No validation is performed on the user-supplied RSS feed URL. Due to the lack of URL validation (whitelisting), it is possible for authenticated attackers to execute Server-Side Request Forgery attacks. Using this issue it is possible to call the Apache Axis AdminService webservice in order to execute arbitrary code with the privileges of the Tomcat user.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-12-30 CVE Reserved
- 2020-04-15 CVE Published
- 2024-09-10 EPSS Updated
- 2024-09-16 CVE Updated
- 2024-09-16 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-918: Server-Side Request Forgery (SSRF)
CAPEC
References (4)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
http://packetstormsecurity.com/files/157329/QRadar-Community-Edition-7.3.1.6-Server-Side-Request-Forgery.html | 2024-09-16 | |
http://seclists.org/fulldisclosure/2020/Apr/35 | 2024-09-16 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/176404 | 2022-06-29 | |
https://www.ibm.com/support/pages/node/6189663 | 2022-06-29 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ibm Search vendor "Ibm" | Qradar Security Information And Event Manager Search vendor "Ibm" for product "Qradar Security Information And Event Manager" | >= 7.3.0 < 7.3.3 Search vendor "Ibm" for product "Qradar Security Information And Event Manager" and version " >= 7.3.0 < 7.3.3" | - |
Affected
| in | Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | - | - |
Safe
|
Ibm Search vendor "Ibm" | Qradar Security Information And Event Manager Search vendor "Ibm" for product "Qradar Security Information And Event Manager" | 7.3.3 Search vendor "Ibm" for product "Qradar Security Information And Event Manager" and version "7.3.3" | - |
Affected
| in | Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | - | - |
Safe
|
Ibm Search vendor "Ibm" | Qradar Security Information And Event Manager Search vendor "Ibm" for product "Qradar Security Information And Event Manager" | 7.3.3 Search vendor "Ibm" for product "Qradar Security Information And Event Manager" and version "7.3.3" | p1 |
Affected
| in | Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | - | - |
Safe
|
Ibm Search vendor "Ibm" | Qradar Security Information And Event Manager Search vendor "Ibm" for product "Qradar Security Information And Event Manager" | 7.3.3 Search vendor "Ibm" for product "Qradar Security Information And Event Manager" and version "7.3.3" | p2 |
Affected
| in | Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | - | - |
Safe
|