CVE-2023-29260
CVSS 3.1 Score 5.4 of 10 (medium)
Details
Summary
CVE-2023-29260: IBM Sterling Connect:Express for UNIX version 1.5 contains a server-side request forgery (SSRF) vulnerability. An authenticated attacker can exploit this issue to send unauthorized requests from the affected system. Potentially, this could lead to network enumeration or facilitation of further attacks. (IBM X-Force ID: 252135) This vulnerability, identified as CVE-2023-29260, affects IBM Sterling Connect:Express for UNIX version 1.5. An authenticated user can manipulate the system to send unauthorized requests, leading to network enumeration and potentially enabling other attacks. This issue should be addressed promptly to minimize potential risks. (IBM X-Force ID: 252135) IBM Sterling Connect:Express for UNIX 1.5 (CVE-2023-29260) is susceptible to server-side request forgery (SSRF), compromising the system's integrity. Authenticated attackers can send malicious requests, which may result in network enumeration and other attacks. IBM X-Force ID: 252135 provides more details on this security concern. Security vulnerability CVE-2023-29260 impacts IBM Sterling Connect:Express for UNIX 1.5. Affected systems may be exposed to server-side request forgery (SSRF) attacks, enabling authenticated attackers to send unauthorized requests. Potential consequences include network enumeration and further attacks. (IBM X-Force ID: 252135) IBM Sterling Connect:Express for UNIX 1.5 (CVE-2023-29260) is vulnerable to server-side request forgery (SSRF), allowing authenticated attackers to send unauthorized requests from the system. The consequences of this vulnerability can range from network enumeration to facilitating additional attacks. (IBM X-Force ID: 252135)
Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.
Affected Vendors
- IBM Corporation
Advisories, Assessments, and Mitigations
Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future
- Gain complete coverage of your cyber, third party, and physical attack surface
- Proactively mitigate threats before they turn into costly attacks
- Make fast, effective, data-driven decisions