IBM TRIRIGA Application Platform 3.3 prior to 3.3.2.6, 3.4 prior to 3.4.2.4, and 3.5 prior to 3.5.0.2 allows remote authenticated users to conduct server-side request forgery (SSRF) attacks, and trigger network traffic to arbitrary intranet or Internet hosts, via a crafted proxy request to a web service.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
ibm tririga application platform 3.4.1.3 |
||
ibm tririga application platform 3.4.1.1 |
||
ibm tririga application platform 3.3.2.4 |
||
ibm tririga application platform 3.3.2.2 |
||
ibm tririga application platform 3.3.2.0 |
||
ibm tririga application platform 3.3.0.2 |
||
ibm tririga application platform 3.3.0.0 |
||
ibm tririga application platform 3.5.0.0 |
||
ibm tririga application platform 3.4.2.3 |
||
ibm tririga application platform 3.4.2.2 |
||
ibm tririga application platform 3.4.2.1 |
||
ibm tririga application platform 3.3.1.3 |
||
ibm tririga application platform 3.3.1.2 |
||
ibm tririga application platform 3.3.1.1 |
||
ibm tririga application platform 3.3.1.0 |
||
ibm tririga application platform 3.4.1.0 |
||
ibm tririga application platform 3.4.0.1 |
||
ibm tririga application platform 3.4.0.0 |
||
ibm tririga application platform 3.3.2.5 |
||
ibm tririga application platform 3.5.0.1 |
||
ibm tririga application platform 3.4.2.0 |
||
ibm tririga application platform 3.4.1.2 |
||
ibm tririga application platform 3.3.2.3 |
||
ibm tririga application platform 3.3.2.1 |
||
ibm tririga application platform 3.3.0.1 |