{"containers":{"cna":{"affected":[{"product":"Sterling B2B Integrator","vendor":"IBM","versions":[{"status":"affected","version":"6.0.0.0"},{"status":"affected","version":"5.2.0.0"},{"status":"affected","version":"6.0.3.2"},{"status":"affected","version":"6.1.0.0"},{"status":"affected","version":"5.2.6.5_2"}]}],"datePublic":"2021-01-04T00:00:00.000Z","descriptions":[{"lang":"en","value":"IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5_2, 6.0.0.0 through 6.0.3.2, and 6.1.0.0 could allow a remote attacker to execute arbitrary code on the system, caused by the deserialization of untrusted data. By sending specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code with SYSTEM privileges. IBM X-Force ID: 172452."}],"metrics":[{"cvssV3_0":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","exploitCodeMaturity":"UNPROVEN","integrityImpact":"HIGH","privilegesRequired":"LOW","remediationLevel":"OFFICIAL_FIX","reportConfidence":"CONFIRMED","scope":"UNCHANGED","temporalScore":7.7,"temporalSeverity":"HIGH","userInteraction":"NONE","vectorString":"CVSS:3.0/AC:L/S:U/I:H/AV:N/PR:L/C:H/UI:N/A:H/RL:O/RC:C/E:U","version":"3.0"}}],"problemTypes":[{"descriptions":[{"description":"Gain Access","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2021-01-05T15:10:17.000Z","orgId":"9a959283-ebb5-44b6-b705-dcc2bbced522","shortName":"ibm"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://www.ibm.com/support/pages/node/6396172"},{"name":"ibm-sterling-cve20194728-code-exec (172452)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/172452"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"psirt@us.ibm.com","DATE_PUBLIC":"2021-01-04T00:00:00","ID":"CVE-2019-4728","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Sterling B2B Integrator","version":{"version_data":[{"version_value":"6.0.0.0"},{"version_value":"5.2.0.0"},{"version_value":"6.0.3.2"},{"version_value":"6.1.0.0"},{"version_value":"5.2.6.5_2"}]}}]},"vendor_name":"IBM"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5_2, 6.0.0.0 through 6.0.3.2, and 6.1.0.0 could allow a remote attacker to execute arbitrary code on the system, caused by the deserialization of untrusted data. By sending specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code with SYSTEM privileges. IBM X-Force ID: 172452."}]},"impact":{"cvssv3":{"BM":{"A":"H","AC":"L","AV":"N","C":"H","I":"H","PR":"L","S":"U","UI":"N"},"TM":{"E":"U","RC":"C","RL":"O"}}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Gain Access"}]}]},"references":{"reference_data":[{"name":"https://www.ibm.com/support/pages/node/6396172","refsource":"CONFIRM","title":"IBM Security Bulletin 6396172 (Sterling B2B Integrator)","url":"https://www.ibm.com/support/pages/node/6396172"},{"name":"ibm-sterling-cve20194728-code-exec (172452)","refsource":"XF","title":"X-Force Vulnerability Report","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/172452"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T19:40:49.087Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://www.ibm.com/support/pages/node/6396172"},{"name":"ibm-sterling-cve20194728-code-exec (172452)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/172452"}]}]},"cveMetadata":{"assignerOrgId":"9a959283-ebb5-44b6-b705-dcc2bbced522","assignerShortName":"ibm","cveId":"CVE-2019-4728","datePublished":"2021-01-05T15:10:17.666Z","dateReserved":"2019-01-03T00:00:00.000Z","dateUpdated":"2024-09-17T03:07:40.149Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}