Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:ibm:kenexa_lcms_premier:9.1:*:*:*:*:*:*:*", "matchCriteriaId": "0B5A416C-F511-4016-B04E-1C8030755234", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:kenexa_lcms_premier:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "424A977D-F0E8-4A5E-974A-62676F17599D", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:kenexa_lcms_premier:9.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "BC1D6409-70BC-4ED0-A9A9-1A83EE61719D", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:kenexa_lcms_premier:9.3:*:*:*:*:*:*:*", "matchCriteriaId": "EA2557BE-4B29-4125-A39A-287F9F9FB6A8", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:kenexa_lcms_premier:9.4:*:*:*:*:*:*:*", "matchCriteriaId": "764D4D62-19BA-4DE7-A2D8-233C45CA26B3", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:kenexa_lcms_premier:9.5:*:*:*:*:*:*:*", "matchCriteriaId": "3037BB6F-26C8-4F39-9FB5-1EF592E46B36", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:kenexa_lcms_premier:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "E386AA38-B144-43F7-9790-8C79B5FC88E5", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:kenexa_lcms_premier:10.2:*:*:*:*:*:*:*", "matchCriteriaId": "FA364F9B-AE53-402F-8FA9-EFDB45435964", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:kenexa_lcms_premier:10.3:*:*:*:*:*:*:*", "matchCriteriaId": "39991639-4A05-4AE8-B793-44A7B60F84F9", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "IBM Kenexa LCMS Premier on Cloud 9.x and 10.0 could allow a remote attacker to obtain sensitive information, caused by the failure to set the secure flag for the session cookie in SSL mode. By intercepting its transmission within an HTTP session, an attacker could exploit this vulnerability to capture the cookie and obtain sensitive information. IBM Reference #: 1998874."}, {"lang": "es", "value": "IBM Kenexa LCMS Premier en Cloud 9.x y 10.0 podr\u00edan permitir a un atacanter remoto obtener informaci\u00f3n sensible, provocado por el fallo para establecer el indicador seguro para la cookie de sesi\u00f3n en modo SSL. Interceptando esta transmisi\u00f3n dentro de una sesi\u00f3n HTTP, un atacante podr\u00eda explotar esta vulnerabilidad para capturar la cookie y obtener informaci\u00f3n sensible. Referencia IBM #: 1998874."}], "id": "CVE-2017-1142", "lastModified": "2024-11-21T03:21:23.640", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0"}, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2017-03-27T22:59:00.320", "references": [{"source": "psirt@us.ibm.com", "tags": ["Mitigation", "Vendor Advisory"], "url": "http://www.ibm.com/support/docview.wss?uid=swg21998874"}, {"source": "psirt@us.ibm.com", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/97081"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Mitigation", "Vendor Advisory"], "url": "http://www.ibm.com/support/docview.wss?uid=swg21998874"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/97081"}], "sourceIdentifier": "psirt@us.ibm.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-200"}], "source": "nvd@nist.gov", "type": "Primary"}]}