CVE-2023-35020
IBM Sterling Control Center directory traversal
Severity Score
5.3
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Attend
*SSVC
Descriptions
IBM Sterling Control Center 6.3.0 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 257874.
IBM Sterling Control Center versión 6.3.0 podría permitir que un atacante remoto atraviese directorios del sistema. Un atacante podría enviar una solicitud URL especialmente manipulada que contenga secuencias de "puntos" (/../) para ver archivos arbitrarios en el sistema. ID de IBM X-Force: 257874.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Attend
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2023-06-11 CVE Reserved
- 2024-01-19 CVE Published
- 2024-10-21 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
References (2)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.ibm.com/support/pages/node/7107788 | 2024-01-24 |
URL | Date | SRC |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/257874 | 2024-01-24 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ibm Search vendor "Ibm" | Sterling Control Center Search vendor "Ibm" for product "Sterling Control Center" | 6.3.0 Search vendor "Ibm" for product "Sterling Control Center" and version "6.3.0" | - |
Affected
| in | Ibm Search vendor "Ibm" | Aix Search vendor "Ibm" for product "Aix" | - | - |
Safe
|
Ibm Search vendor "Ibm" | Sterling Control Center Search vendor "Ibm" for product "Sterling Control Center" | 6.3.0 Search vendor "Ibm" for product "Sterling Control Center" and version "6.3.0" | - |
Affected
| in | Ibm Search vendor "Ibm" | Linux On Ibm Z Search vendor "Ibm" for product "Linux On Ibm Z" | - | - |
Safe
|
Ibm Search vendor "Ibm" | Sterling Control Center Search vendor "Ibm" for product "Sterling Control Center" | 6.3.0 Search vendor "Ibm" for product "Sterling Control Center" and version "6.3.0" | - |
Affected
| in | Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | - | - |
Safe
|
Ibm Search vendor "Ibm" | Sterling Control Center Search vendor "Ibm" for product "Sterling Control Center" | 6.3.0 Search vendor "Ibm" for product "Sterling Control Center" and version "6.3.0" | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | - | - |
Safe
|