

Popular Gogs Open-Source Git Service Reveals Critical Unpatched Vulnerabilities
July 8, 2024
CVE-2024-22277 – VMware Cloud Director Availability Vulnerability
July 8, 2024
Popular Gogs Open-Source Git Service Reveals Critical Unpatched Vulnerabilities
July 8, 2024
CVE-2024-22277 – VMware Cloud Director Availability Vulnerability
July 8, 2024Severity
Medium
Analysis Summary
CVE-2024-37528 CVSS:4.8
IBM Cloud Pak for Business Automation 18.0.0, 18.0.1, 18.0.2, 19.0.1, 19.0.2, 19.0.3, 20.0.1, 20.0.2, 20.0.3, 21.0.1, 21.0.2, 21.0.3, 22.0.1, 22.0.2, 23.0.1, and 23.0.2 is vulnerable to cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
CVE-2024-31897 CVSS:4.3
IBM Cloud Pak for Business Automation 18.0.0, 18.0.1, 18.0.2, 19.0.1, 19.0.2, 19.0.3, 20.0.1, 20.0.2, 20.0.3, 21.0.1, 21.0.2, 21.0.3, 22.0.1, 22.0.2, 23.0.1, and 23.0.2 vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks.
CVE-2024-38330 CVSS:7
IBM System Management for i 7.2, 7.3, and 7.4 could allow a local user to gain elevated privileges due to an unqualified library program call. A malicious actor could cause user-controlled code to run with administrator privilege.
CVE-2024-39723 CVSS:4.6
IBM FlashSystem 5300 USB ports may be usable even if the port has been disabled by the administrator. A user with physical access to the system could use the USB port to cause loss of access to data.
Impact
- Denial of Service
- Gain Access
- Code Execution
- Privilege Escalation
Indicators of Compromise
CVE
- CVE-2024-37528
- CVE-2024-31897
- CVE-2024-38330
- CVE-2024-39723
Affected Vendors
Affected Products
- IBM i 7.2
- IBM i 7.3
- IBM i 7.4
- IBM Business Automation Workflow containers 20.0.0.1
- IBM Business Automation Workflow traditional 19.0.0.1
- IBM Business Automation Workflow traditional 19.0.0.3
- IBM Business Automation Workflow traditional 20.0.0.1
- IBM Business Automation Workflow traditional 20.0.0.2
- IBM Business Automation Workflow traditional 21.0.1
- IBM Business Automation Workflow containers 20.0.0.2
- IBM Business Automation Workflow containers 21.0.3
- IBM Business Automation Workflow containers 21.0.2
- IBM Business Automation Workflow containers 22.0.1
- IBM Business Automation Workflow traditional 22.0.1
- IBM Business Automation Workflow traditional 19.0.0.2
- IBM Business Automation Workflow traditional 21.0.3.1
- IBM Cloud Pak for Business Automation 18.0.0
- IBM Cloud Pak for Business Automation 18.0.1
- IBM Cloud Pak for Business Automation 18.0.2
- IBM Cloud Pak for Business Automation 19.0.1
- IBM Cloud Pak for Business Automation 19.0.2
- IBM Cloud Pak for Business Automation 19.0.3
- IBM Cloud Pak for Business Automation 20.0.1
- IBM Cloud Pak for Business Automation 20.0.2
- IBM Cloud Pak for Business Automation 20.0.3
- IBM Cloud Pak for Business Automation 21.0.3
- IBM Cloud Pak for Business Automation 22.0.1
- IBM Cloud Pak for Business Automation 22.0.2
- IBM Cloud Pak for Business Automation 23.0.1
- IBM Business Automation Workflow containers 22.0.2
- IBM Business Automation Workflow traditional 22.0.2
- IBM Business Automation Workflow containers 23.0.1
- IBM Business Automation Workflow traditional 23.0.1
- IBM Business Automation Workflow traditional 23.0.2
- IBM Cloud Pak for Business Automation 23.0.2
- IBM Business Automation Workflow containers 23.0.2
- IBM Storage Virtualize 8.6
Remediation
Refer to IBM Security Advisory for patch, upgrade or suggested workaround information.