Vulnerability Details : CVE-2013-0532
Cross-site request forgery (CSRF) vulnerability in IBM Security AppScan Enterprise 5.6 and 8.x before 8.7 and IBM Rational Policy Tester 5.6 and 8.x before 8.5.0.4 allows remote attackers to hijack the authentication of arbitrary users for requests that cause a denial of service via malformed HTTP data.
Vulnerability category: Cross-site request forgery (CSRF)Denial of service
Exploit prediction scoring system (EPSS) score for CVE-2013-0532
Probability of exploitation activity in the next 30 days: 0.19%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 55 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2013-0532
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2013-0532
-
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-0532
-
http://www-01.ibm.com/support/docview.wss?uid=swg21631304
IBM notice: The page you requested cannot be displayedVendor Advisory
-
http://www-01.ibm.com/support/docview.wss?uid=swg21626264
IBM Security Bulletin: Multiple vulnerabilities in IBM Security AppScan Enterprise (CVE-2013-0532, CVE-2013-0510, CVE-2013-0512, CVE-2012-4431, CVE-2013-0513, CVE-2008-4033, CVE-2013-0474, CVE-2013-05Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/82595
IBM Rational Appscan cross-site request forgery CVE-2013-0532 Vulnerability Report
Products affected by CVE-2013-0532
- cpe:2.3:a:ibm:security_appscan:8.0.0.0:-:enterprise:*:*:*:*:*
- cpe:2.3:a:ibm:security_appscan:8.5.0.0:-:enterprise:*:*:*:*:*
- cpe:2.3:a:ibm:security_appscan:8.0.0.1:-:enterprise:*:*:*:*:*
- cpe:2.3:a:ibm:security_appscan:8.6.0.0:-:enterprise:*:*:*:*:*
- cpe:2.3:a:ibm:security_appscan:8.5.0.1:-:enterprise:*:*:*:*:*
- cpe:2.3:a:ibm:security_appscan:8.0.1.0:-:enterprise:*:*:*:*:*
- cpe:2.3:a:ibm:security_appscan:8.0.1.1:-:enterprise:*:*:*:*:*
- cpe:2.3:a:ibm:security_appscan:8.0.0.2:-:enterprise:*:*:*:*:*
- cpe:2.3:a:ibm:security_appscan:8.6.0.1:-:enterprise:*:*:*:*:*
- cpe:2.3:a:ibm:security_appscan:8.6.0.2:-:enterprise:*:*:*:*:*
- cpe:2.3:a:ibm:security_appscan:5.6.0.0:-:enterprise:*:*:*:*:*
- cpe:2.3:a:ibm:security_appscan:8.0.11:-:enterprise:*:*:*:*:*
- cpe:2.3:a:ibm:rational_policy_tester:8.5.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:rational_policy_tester:8.0.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:rational_policy_tester:5.6.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:rational_policy_tester:8.0.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:rational_policy_tester:8.0.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:rational_policy_tester:8.5.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:rational_policy_tester:8.0.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:rational_policy_tester:8.0.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:rational_policy_tester:8.5.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:rational_policy_tester:8.5.0.2:*:*:*:*:*:*:*