| Title | IBM Security AppScan Enterprise および Rational Policy Tester における SSL サーバになりすまされる脆弱性 |
|---|---|
| Summary | IBM Security AppScan Enterprise および Rational Policy Tester には、マニュアル探査プロキシ (Manual Explore Proxy) 機能の使用時に、X.509 証明書を適切に検証しないため、SSL サーバになりすまされる脆弱性が存在します。 |
| Possible impacts | 中間者攻撃 (man-in-the-middle attack) により、任意の証明書を介して、SSL サーバになりすまされる可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | Dec. 28, 2012, midnight |
| Registration Date | Jan. 4, 2013, 12:09 p.m. |
| Last Update | Jan. 4, 2013, 12:09 p.m. |
| CVSS2.0 : 警告 | |
| Score | 5.8 |
|---|---|
| Vector | AV:N/AC:M/Au:N/C:P/I:P/A:N |
| IBM |
| IBM Rational Policy Tester 8.5.0.3 未満 |
| IBM Security AppScan 8.6.0.2 未満 |
| No | Changed Details | Date of change |
|---|---|---|
| 0 | [2013年01月04日] 掲載 |
Feb. 17, 2018, 10:37 a.m. |
| Summary | IBM Security AppScan Enterprise before 8.6.0.2 and Rational Policy Tester before 8.5.0.3 do not validate X.509 certificates during use of the Manual Explore Proxy feature, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary certificate. |
|---|---|
| Publication Date | Dec. 28, 2012, 8:48 p.m. |
| Registration Date | Jan. 28, 2021, 2:53 p.m. |
| Last Update | Nov. 21, 2024, 10:35 a.m. |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:ibm:security_appscan:6.0.0.0:-:enterprise:*:*:*:*:* | |||||
| cpe:2.3:a:ibm:security_appscan:8.0.0.0:-:enterprise:*:*:*:*:* | |||||
| cpe:2.3:a:ibm:security_appscan:8.5.0.0:-:enterprise:*:*:*:*:* | |||||
| cpe:2.3:a:ibm:security_appscan:6.0.2.0:-:enterprise:*:*:*:*:* | |||||
| cpe:2.3:a:ibm:security_appscan:8.5.0.1:-:enterprise:*:*:*:*:* | |||||
| cpe:2.3:a:ibm:security_appscan:8.6.0.0:-:enterprise:*:*:*:*:* | |||||
| cpe:2.3:a:ibm:security_appscan:8.0.0.1:-:enterprise:*:*:*:*:* | |||||
| cpe:2.3:a:ibm:security_appscan:6.0.1.0:-:enterprise:*:*:*:*:* | |||||
| cpe:2.3:a:ibm:security_appscan:6.1.1.0:-:enterprise:*:*:*:*:* | |||||
| Configuration2 | or higher | or less | more than | less than | |
| cpe:2.3:a:ibm:rational_policy_tester:8.0.0.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:ibm:rational_policy_tester:5.6.0.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:ibm:rational_policy_tester:8.0.1.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:ibm:rational_policy_tester:8.0.0.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:ibm:rational_policy_tester:5.5.0.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:ibm:security_appscan:*:-:enterprise:*:*:*:*:* | 8.6.0.1 | ||||
| cpe:2.3:a:ibm:rational_policy_tester:5.5.0.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:ibm:rational_policy_tester:8.5.0.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:ibm:rational_policy_tester:8.5.0.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:ibm:rational_policy_tester:8.0.1.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:ibm:rational_policy_tester:*:*:*:*:*:*:*:* | 8.5.0.2 | ||||
| cpe:2.3:a:ibm:rational_policy_tester:5.6.0.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:ibm:rational_policy_tester:5.6.0.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:ibm:rational_policy_tester:5.5.0.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:ibm:rational_policy_tester:5.6.0.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:ibm:rational_policy_tester:8.0.0.1:*:*:*:*:*:*:* | |||||