CVE-2021-20502
Published Mar 30, 2021
Last updated 4 years ago
Overview
- Description
- IBM Jazz Foundation Products are vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 198059.
- Source
- psirt@us.ibm.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.1
- Impact score
- 4.2
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
- Severity
- HIGH
CVSS 3.0
- Type
- Secondary
- Base score
- 7.1
- Impact score
- 4.2
- Exploitability score
- 2.8
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 5.5
- Impact score
- 4.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:P/I:N/A:P
Weaknesses
- nvd@nist.gov
- CWE-611
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:engineering_insights:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5C056314-C5ED-4CCA-B01E-34B3DA7AF6F1" }, { "criteria": "cpe:2.3:a:ibm:engineering_insights:7.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BFCC1773-1BAE-4407-A9EE-49A87E513BF3" }, { "criteria": "cpe:2.3:a:ibm:engineering_insights:7.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AAE02ED7-E365-4AAF-9935-19E0B4711BE5" }, { "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_management:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AA1E70C2-4189-4DA2-8A14-6FE04D4093CB" }, { "criteria": "cpe:2.3:a:ibm:engineering_requirements_quality_assistant_on-premises:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D75A41A-B2E2-463C-8B10-56F6473866EB" }, { "criteria": "cpe:2.3:a:ibm:engineering_workflow_management:7.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "851FF0C7-64EC-4A6A-9C81-0791C3E68D82" }, { "criteria": "cpe:2.3:a:ibm:engineering_workflow_management:7.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "46C5E316-FB11-4EDD-A22C-22E571DF9091" }, { "criteria": "cpe:2.3:a:ibm:engineering_workflow_management:7.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9E5C3FDC-DD05-423A-8A14-8372C9741D9B" }, { "criteria": "cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7F242460-F1F6-4D37-8817-4F6040FB5F5C" }, { "criteria": "cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "07056A3E-E464-4E08-8BEC-0801E851236C" }, { "criteria": "cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B31B4E66-AA82-4EB4-A6D7-6BEEEBC86E1C" }, { "criteria": "cpe:2.3:a:ibm:rational_team_concert:6.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "73FA2148-90A1-437D-8AD6-F626705FC780" }, { "criteria": "cpe:2.3:a:ibm:rational_team_concert:6.0.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AF6288A2-92B2-49EA-B5A7-9BB210BE93CC" }, { "criteria": "cpe:2.3:a:ibm:rational_team_concert:6.0.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4DBDD077-488A-45C6-AD72-3D79361509E1" } ], "operator": "OR" } ] } ]