CVE-2016-3033

Published on: 12/01/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:01 PM UTC

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

Certain versions of Appscan Source from Ibm contain the following vulnerability:

IBM AppScan Source 8.7 through 9.0.3.3 allows remote authenticated users to read arbitrary files or cause a denial of service (memory consumption) via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

  • CVE-2016-3033 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 8.1 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW LOW NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH NONE HIGH

CVSS2 Score: 5.5 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK LOW SINGLE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL NONE PARTIAL

CVE References

Description Tags Link
IBM AppScan Source CVE-2016-3033 XML External Entity Denial of Service Vulnerability Third Party Advisory
VDB Entry
cve.report (archive)
text/html
URL Logo BID 92388
IBM Security Bulletin:AppScan Source vulnerable to denial of service caused by an XML External Entity (CVE-2016-3033) - United States Vendor Advisory
web.archive.org
text/html
Inactive LinkNot Archived
URL Logo CONFIRM www-01.ibm.com/support/docview.wss?uid=swg21987326

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationIbmAppscan Source8.7AllAllAll
ApplicationIbmAppscan Source8.7.0.1AllAllAll
ApplicationIbmAppscan Source8.8AllAllAll
ApplicationIbmAppscan Source9.0AllAllAll
ApplicationIbmAppscan Source9.0.0.1AllAllAll
ApplicationIbmAppscan Source9.0.1AllAllAll
ApplicationIbmAppscan Source9.0.2AllAllAll
ApplicationIbmAppscan Source9.0.3AllAllAll
ApplicationIbmAppscan Source9.0.3.1AllAllAll
ApplicationIbmAppscan Source9.0.3.2AllAllAll
ApplicationIbmAppscan Source9.0.3.3AllAllAll
ApplicationIbmAppscan Source8.7AllAllAll
ApplicationIbmAppscan Source8.7.0.1AllAllAll
ApplicationIbmAppscan Source8.8AllAllAll
ApplicationIbmAppscan Source9.0AllAllAll
ApplicationIbmAppscan Source9.0.0.1AllAllAll
ApplicationIbmAppscan Source9.0.1AllAllAll
ApplicationIbmAppscan Source9.0.2AllAllAll
ApplicationIbmAppscan Source9.0.3AllAllAll
ApplicationIbmAppscan Source9.0.3.1AllAllAll
ApplicationIbmAppscan Source9.0.3.2AllAllAll
ApplicationIbmAppscan Source9.0.3.3AllAllAll
  • cpe:2.3:a:ibm:appscan_source:8.7:*:*:*:*:*:*:*:
  • cpe:2.3:a:ibm:appscan_source:8.7.0.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:ibm:appscan_source:8.8:*:*:*:*:*:*:*:
  • cpe:2.3:a:ibm:appscan_source:9.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:ibm:appscan_source:9.0.0.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:ibm:appscan_source:9.0.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:ibm:appscan_source:9.0.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:ibm:appscan_source:9.0.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:ibm:appscan_source:9.0.3.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:ibm:appscan_source:9.0.3.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:ibm:appscan_source:9.0.3.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:ibm:appscan_source:8.7:*:*:*:*:*:*:*:
  • cpe:2.3:a:ibm:appscan_source:8.7.0.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:ibm:appscan_source:8.8:*:*:*:*:*:*:*:
  • cpe:2.3:a:ibm:appscan_source:9.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:ibm:appscan_source:9.0.0.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:ibm:appscan_source:9.0.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:ibm:appscan_source:9.0.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:ibm:appscan_source:9.0.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:ibm:appscan_source:9.0.3.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:ibm:appscan_source:9.0.3.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:ibm:appscan_source:9.0.3.3:*:*:*:*:*:*:*: