Vulnerability Details : CVE-2021-29872
IBM Cloud Pak for Automation 21.0.1 and 21.0.2 - Business Automation Studio Component is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. By sending a specially crafted HTTP request, a remote attacker could exploit this vulnerability to inject HTTP HOST header, which will allow the attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. IBM X-Force ID: 206228.
Vulnerability category: Cross site scripting (XSS)
Exploit prediction scoring system (EPSS) score for CVE-2021-29872
Probability of exploitation activity in the next 30 days: 0.07%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 27 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2021-29872
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
3.5
|
LOW | AV:N/AC:M/Au:S/C:N/I:P/A:N |
6.8
|
2.9
|
NIST |
5.4
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N |
2.8
|
2.5
|
IBM Corporation |
5.4
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N |
2.3
|
2.7
|
NIST |
CWE ids for CVE-2021-29872
-
The product prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-29872
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/206228
IBM Cloud Pak for Automation HOST header injection CVE-2021-29872 Vulnerability ReportVDB Entry;Vendor Advisory
-
https://www.ibm.com/support/pages/node/6541294
Security Bulletin: Host header injection vulnerability in Business Automation Studio in Cloud Pak for Automation (CVE-2021-29872)Patch;Vendor Advisory
Products affected by CVE-2021-29872
- cpe:2.3:a:ibm:cloud_pak_for_automation:*:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:cloud_pak_for_automation:*:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.2:interim_fix001:*:*:*:*:*:*
- cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.2:interim_fix002:*:*:*:*:*:*
- cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.2:interim_fix003:*:*:*:*:*:*
- cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.2:interim_fix004:*:*:*:*:*:*
- cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.2:interim_fix005:*:*:*:*:*:*
- cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.2:interim_fix006:*:*:*:*:*:*
- cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.1:interim_fix001:*:*:*:*:*:*
- cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.1:interim_fix002:*:*:*:*:*:*
- cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.1:interim_fix003:*:*:*:*:*:*
- cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.1:interim_fix004:*:*:*:*:*:*
- cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.1:interim_fix005:*:*:*:*:*:*
- cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.1:interim_fix006:*:*:*:*:*:*