Vulnerability Details : CVE-2014-0871
RICOS in IBM Algo Credit Limits (aka ACLM) 4.5.0 through 4.7.0 before 4.7.0.03 FP5 in IBM Algorithmics allows remote attackers to obtain potentially sensitive Tomcat stack-trace information via non-printing characters in a cookie to the /classes/ URI, as demonstrated by the \x00 character.
Vulnerability category: Information leak
Products affected by CVE-2014-0871
- cpe:2.3:a:ibm:algo_credit_limits:4.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:algo_credit_limits:4.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:algorithmics:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-0871
0.54%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 77 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-0871
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:N/A:N |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2014-0871
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-0871
-
http://www.securityfocus.com/archive/1/532598/100/0/threaded
SecurityFocus
-
http://www-01.ibm.com/support/docview.wss?uid=swg21675881
IBM Security Bulletin: Multiple Security Vulnerabilities in Certain GUI Components of IBM Algo Credit Limits.Vendor Advisory
-
http://packetstormsecurity.com/files/127304/IBM-Algorithmics-RICOS-Disclosure-XSS-CSRF.html
IBM Algorithmics RICOS Disclosure / XSS / CSRF ≈ Packet Storm
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/90945
IBM Algo Credit Limits ACLM Web GUI information disclosure CVE-2014-0871 Vulnerability Report
-
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20140630-0_IBM_Algorithmics_RICOS_multiple_vulnerabilities_v10.txt
-
http://seclists.org/fulldisclosure/2014/Jun/173
Full Disclosure: SEC Consult SA-20140630-0 :: Multiple vulnerabilities in IBM Algorithmics RICOS
Jump to