Previous releases of IBM Security AppScan Standard are affected by a vulnerability reported in proprietary IBM code. This is in regards to a cross-site request forgery vulnerability.
AppScan Manual Explore browser sends Platform Authentication credentials to unauthenticated server
CVE ID: CVE-2013-0474
An attacker could specially craft a page to capture platform credentials upon visiting the page with the manual explore browser plug-in. This could lead to takeover of the test account being used for scanning. Specific knowledge of AppScan Standard along with the ability to modify the site being tested is necessary to conduct the attack. The attack can be conducted over the internet. No authentication is required for this attack.
CVSS Base Score: 4.3
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/81338 for the current score
CVSS Environmental Score*: Undefined
CVSS String: (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Running on Microsoft Windows:
· Versions 8.0 through 188.8.131.52 of Security AppScan Standard
The recommended solution is to apply the fix for each named product as soon as practical. Please see below for information about the fixes available.
For version 8.0 to 184.108.40.206 of AppScan Standard
· Upgrade to version 8.7 of AppScan Standard
If you are unable to upgrade, contact IBM Technical Support.
Not applicable, upgrade to version 8.7 of AppScan Standard Edition
Complete CVSS Guide
On-line Calculator V2
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the References section of this alert.
Note: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.