Vulnerability Details : CVE-2015-1884
Directory traversal vulnerability in IBM Business Process Manager (BPM) 7.5.x through 7.5.1.2, 8.0.x through 8.0.1.3, 8.5.0 through 8.5.0.1, and 8.5.5 through 8.5.5.0 and WebSphere Lombardi Edition (WLE) 7.2 through 7.2.0.5 allows remote authenticated users to read arbitrary files via a crafted internationalization-file URL.
Vulnerability category: Directory traversal
Products affected by CVE-2015-1884
- cpe:2.3:a:ibm:business_process_manager:7.5.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_process_manager:7.5.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.0.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.0.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.0.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_process_manager:7.5.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_process_manager:7.5.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_process_manager:7.5.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.0.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.0.1.0:*:*:*:advanced:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.0.1.1:*:*:*:advanced:*:*:*
- cpe:2.3:a:ibm:business_process_manager:7.5.1.1:*:*:*:advanced:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.0.0.0:*:*:*:advanced:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:advanced:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.0.1.2:*:*:*:advanced:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.0.1.3:*:*:*:advanced:*:*:*
- cpe:2.3:a:ibm:business_process_manager:7.5.0.0:*:*:*:advanced:*:*:*
- cpe:2.3:a:ibm:business_process_manager:7.5.0.1:*:*:*:advanced:*:*:*
- cpe:2.3:a:ibm:business_process_manager:7.5.1.0:*:*:*:advanced:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:advanced:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:advanced:*:*:*
- cpe:2.3:a:ibm:business_process_manager:7.5.1.2:*:*:*:advanced:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.0.1.3:*:*:*:standard:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.0.1.3:*:*:*:express:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.0.1.0:*:*:*:standard:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.0.1.0:*:*:*:express:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.0.1.1:*:*:*:standard:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:express:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:standard:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:express:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.0.0.0:*:*:*:standard:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.0.1.1:*:*:*:express:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.0.1.2:*:*:*:standard:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:express:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:standard:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.0.0.0:*:*:*:express:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.0.1.2:*:*:*:express:*:*:*
- cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:standard:*:*:*
- cpe:2.3:a:ibm:business_process_manager:7.5.1.1:*:*:*:express:*:*:*
- cpe:2.3:a:ibm:business_process_manager:7.5.1.1:*:*:*:standard:*:*:*
- cpe:2.3:a:ibm:business_process_manager:7.5.0.1:*:*:*:express:*:*:*
- cpe:2.3:a:ibm:business_process_manager:7.5.0.1:*:*:*:standard:*:*:*
- cpe:2.3:a:ibm:business_process_manager:7.5.0.0:*:*:*:express:*:*:*
- cpe:2.3:a:ibm:business_process_manager:7.5.1.0:*:*:*:standard:*:*:*
- cpe:2.3:a:ibm:business_process_manager:7.5.1.2:*:*:*:express:*:*:*
- cpe:2.3:a:ibm:business_process_manager:7.5.0.0:*:*:*:standard:*:*:*
- cpe:2.3:a:ibm:business_process_manager:7.5.1.0:*:*:*:express:*:*:*
- cpe:2.3:a:ibm:business_process_manager:7.5.1.2:*:*:*:standard:*:*:*
- cpe:2.3:a:ibm:websphere:7.2.0.3:*:*:*:lombardi:*:*:*
- cpe:2.3:a:ibm:websphere:7.2.0.4:*:*:*:lombardi:*:*:*
- cpe:2.3:a:ibm:websphere:7.2.0.5:*:*:*:lombardi:*:*:*
- cpe:2.3:a:ibm:websphere:7.2:*:*:*:lombardi:*:*:*
- cpe:2.3:a:ibm:websphere:7.2.0.2:*:*:*:lombardi:*:*:*
- cpe:2.3:a:ibm:websphere:7.2.0.1:*:*:*:lombardi:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-1884
0.14%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 49 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-1884
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:N/A:N |
8.0
|
2.9
|
NIST |
CWE ids for CVE-2015-1884
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-1884
-
http://www-01.ibm.com/support/docview.wss?uid=swg1JR52957
IBM JR52957: SECURITY APAR - CVE-2015-1884 - FILE PATH TRAVERSAL VULNERABILITY IN COACH FRAMEWORKPatch;Vendor Advisory
-
http://www-01.ibm.com/support/docview.wss?uid=swg21700831
IBM Security Bulletin: File path traversal vulnerability in IBM Business Process Manager (BPM) and WebSphere Lombardi Edition (WLE) (CVE-2015-1884)Patch;Vendor Advisory
-
http://www.securitytracker.com/id/1032701
IBM WebSphere Lombardi Edition Input Validation Flaw Lets Remote Authenticated Users Traverse the Directory - SecurityTracker
-
http://www.securitytracker.com/id/1032700
IBM Business Process Manager Input Validation Flaw Lets Remote Authenticated Users Traverse the Directory - SecurityTracker
-
http://www.securityfocus.com/bid/75360
IBM Business Process Manager and WebSphere Lombardi Edition Directory Traversal VulnerabilityThird Party Advisory;VDB Entry
Jump to