CVE-2012-4832
CVSS V2 Low 1.9
CVSS V3 None
Description
Information Services Framework (ISF) in IBM InfoSphere Information Server 8.1, 8.5 before FP3, and 8.7 and InfoSphere Business Glossary 8.1.1 and 8.1.2 does not have an off autocomplete attribute for the password field on the login page, which makes it easier for remote attackers to obtain access by leveraging an unattended workstation.
Overview
- CVE ID
- CVE-2012-4832
- Assigner
- psirt@us.ibm.com
- Vulnerability Status
- Modified
- Published Version
- 2013-01-31T12:06:18
- Last Modified Date
- 2017-08-29T01:32:22
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:ibm:infosphere_business_glossary:8.1.1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:ibm:infosphere_business_glossary:8.1.2:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:ibm:infosphere_information_server:8.1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:ibm:infosphere_information_server:8.5:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:ibm:infosphere_information_server:8.5.0.1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:ibm:infosphere_information_server:8.5.0.2:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:ibm:infosphere_information_server:8.7:*:*:*:*:*:*:* | 1 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:L/AC:M/Au:N/C:P/I:N/A:N
- Access Vector
- LOCAL
- Access Compatibility
- MEDIUM
- Authentication
- NONE
- Confidentiality Impact
- PARTIAL
- Integrity Impact
- NONE
- Availability Impact
- NONE
- Base Score
- 1.9
- Severity
- LOW
- Exploitability Score
- 3.4
- Impact Score
- 2.9
References
Reference URL | Reference Tags |
---|---|
http://www-01.ibm.com/support/docview.wss?uid=swg21623501 | Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/78906 |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2012-4832 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4832 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 08:48:29 | Added to TrackCVE |