⚠ Exploited in the wild
Exploitation observed in the wild. Not yet on CISA KEV.

CVE-2018-1932Sensitive Information Exposure in IBM API Connect

Severity
4.9MEDIUMNVD
EPSS
5.5%
top 9.78%
CISA KEV
Not in KEV
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedJan 8
Latest updateMay 13

Description

IBM API Connect 5.0.0.0 through 5.0.8.4 is affected by a vulnerability in the role-based access control in the management server that could allow an authenticated user to obtain highly sensitive information. IBM X-Force ID: 153175.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:NExploitability: 1.2 | Impact: 3.6

Affected Packages2 packages

NVDibm/api_connect5.0.0.05.0.8.4
CVEListV5ibm/api_connect5.0.0.0, 5.0.8.4+1

Patches

🔴Vulnerability Details

3
GHSA
GHSA-ffr8-3w9r-g74m: IBM API Connect 52022-05-13
CVEList
CVE-2018-1932: IBM API Connect 52019-01-08
VulnCheck
IBM api_connect Exposure of Sensitive Information to an Unauthorized Actor2018

💬Community

2
Bugzilla
CVE-2018-1100 zsh: buffer overflow in utils.c:checkmailpath() can lead to local arbitrary code execution2018-04-03
Bugzilla
CVE-2018-1083 zsh: Stack-based buffer overflow in gen_matches_files() at compctl.c2018-03-16
CVE-2018-1932 — Sensitive Information Exposure in IBM | cvebase