CVE-2022-36775
IBM Security Verify Access HOST header injection
Severity Score
6.5
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
IBM Security Verify Access 10.0.0.0, 10.0.1.0, 10.0.2.0, 10.0.3.0, and10.0.4.0 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. IBM X-Force ID: 233576.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2022-07-26 CVE Reserved
- 2023-02-17 CVE Published
- 2024-08-03 CVE Updated
- 2024-09-09 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CAPEC
References (2)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.ibm.com/support/pages/node/6953617 | 2023-11-07 |
URL | Date | SRC |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/233576 | 2023-11-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ibm Search vendor "Ibm" | Security Verify Access Search vendor "Ibm" for product "Security Verify Access" | 10.0.0.0 Search vendor "Ibm" for product "Security Verify Access" and version "10.0.0.0" | - |
Affected
| ||||||
Ibm Search vendor "Ibm" | Security Verify Access Search vendor "Ibm" for product "Security Verify Access" | 10.0.1.0 Search vendor "Ibm" for product "Security Verify Access" and version "10.0.1.0" | - |
Affected
| ||||||
Ibm Search vendor "Ibm" | Security Verify Access Search vendor "Ibm" for product "Security Verify Access" | 10.0.2.0 Search vendor "Ibm" for product "Security Verify Access" and version "10.0.2.0" | - |
Affected
| ||||||
Ibm Search vendor "Ibm" | Security Verify Access Search vendor "Ibm" for product "Security Verify Access" | 10.0.3.0 Search vendor "Ibm" for product "Security Verify Access" and version "10.0.3.0" | - |
Affected
| ||||||
Ibm Search vendor "Ibm" | Security Verify Access Search vendor "Ibm" for product "Security Verify Access" | 10.0.4.0 Search vendor "Ibm" for product "Security Verify Access" and version "10.0.4.0" | - |
Affected
| ||||||
Ibm Search vendor "Ibm" | Security Verify Access Docker Search vendor "Ibm" for product "Security Verify Access Docker" | 10.0.0.0 Search vendor "Ibm" for product "Security Verify Access Docker" and version "10.0.0.0" | - |
Affected
| ||||||
Ibm Search vendor "Ibm" | Security Verify Access Docker Search vendor "Ibm" for product "Security Verify Access Docker" | 10.0.1.0 Search vendor "Ibm" for product "Security Verify Access Docker" and version "10.0.1.0" | - |
Affected
| ||||||
Ibm Search vendor "Ibm" | Security Verify Access Docker Search vendor "Ibm" for product "Security Verify Access Docker" | 10.0.2.0 Search vendor "Ibm" for product "Security Verify Access Docker" and version "10.0.2.0" | - |
Affected
| ||||||
Ibm Search vendor "Ibm" | Security Verify Access Docker Search vendor "Ibm" for product "Security Verify Access Docker" | 10.0.3.0 Search vendor "Ibm" for product "Security Verify Access Docker" and version "10.0.3.0" | - |
Affected
| ||||||
Ibm Search vendor "Ibm" | Security Verify Access Docker Search vendor "Ibm" for product "Security Verify Access Docker" | 10.0.4.0 Search vendor "Ibm" for product "Security Verify Access Docker" and version "10.0.4.0" | - |
Affected
|