Headline
CVE-2019-4456: Security Bulletin: ViewONE is vulnerable to XXE attack via HTTP payload (CVE-2019-4456)
IBM Daeja ViewONE Professional, Standard & Virtual 5.0.5 and 5.0.6 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 163620.
Summary
A specially crafted XML payload to the ViewONE service can result in a denial of service attack.
Vulnerability Details
CVEID: CVE-2019-4456
DESCRIPTION: IBM Daeja ViewONE Professional, Standard & Virtual is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources.
CVSS Base Score: 7.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/163620 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L)
Affected Products and Versions
Daeja ViewONE Virtual 5.0 - 5.0.6
Remediation/Fixes
References
Off
Change History
26 July 2019: Original version published
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Internal Use Only
PR:139484 | A:16942
Document Location
Worldwide
[{"Business Unit":{"code":"BU053","label":"Cloud & Data Platform"},"Product":{"code":"SSTTN8","label":"IBM Daeja ViewONE Virtual"},"Component":"","Platform":[{"code":"PF002","label":"AIX"},{"code":"PF016","label":"Linux"},{"code":"PF033","label":"Windows"}],"Version":"5.0.5;5.0.6","Edition":"Virtual","Line of Business":{"code":"LOB45","label":"Automation"}}]