{"api_version":"1","generated_at":"2026-04-23T06:19:00+00:00","cve":"CVE-2020-4763","urls":{"html":"https://cve.report/CVE-2020-4763","api":"https://cve.report/api/cve/CVE-2020-4763.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-4763","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-4763"},"summary":{"title":"CVE-2020-4763","description":"IBM Sterling File Gateway 6.0.0.0 through 6.0.3.2 and 2.2.0.0 through 2.2.6.5 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 188897.","state":"PUBLIC","assigner":"psirt@us.ibm.com","published_at":"2020-11-16 17:15:00","updated_at":"2020-11-23 17:17:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/188897","name":"ibm-sterling-cve20204763-info-disc (188897)","refsource":"XF","tags":["VDB Entry","Vendor Advisory"],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.ibm.com/support/pages/node/6368025","name":"https://www.ibm.com/support/pages/node/6368025","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"Security Bulletin: Cookie Vulnerability Affects IBM Sterling File Gateway (CVE-2020-4763)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-4763","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-4763","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"4763","vulnerable":"1","versionEndIncluding":"2.2.6.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"sterling_file_gateway","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"4763","vulnerable":"1","versionEndIncluding":"6.0.3.2","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"sterling_file_gateway","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"version":{"version_data":[{"version_value":"2.2.0.0"},{"version_value":"6.0.3.2"},{"version_value":"2.2.6.5"},{"version_value":"6.0.0.0"}]},"product_name":"Sterling File Gateway"}]},"vendor_name":"IBM"}]}},"CVE_data_meta":{"ID":"CVE-2020-4763","STATE":"PUBLIC","DATE_PUBLIC":"2020-11-13T00:00:00","ASSIGNER":"psirt@us.ibm.com"},"references":{"reference_data":[{"refsource":"CONFIRM","name":"https://www.ibm.com/support/pages/node/6368025","url":"https://www.ibm.com/support/pages/node/6368025","title":"IBM Security Bulletin 6368025 (Sterling File Gateway)"},{"name":"ibm-sterling-cve20204763-info-disc (188897)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/188897","title":"X-Force Vulnerability Report"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Obtain Information"}]}]},"data_format":"MITRE","description":{"description_data":[{"value":"IBM Sterling File Gateway 6.0.0.0 through 6.0.3.2 and 2.2.0.0 through 2.2.6.5 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 188897.","lang":"eng"}]},"impact":{"cvssv3":{"BM":{"A":"N","PR":"N","I":"N","C":"L","AV":"N","SCORE":"4.300","S":"U","AC":"L","UI":"R"},"TM":{"RC":"C","RL":"O","E":"U"}}},"data_type":"CVE","data_version":"4.0"},"nvd":{"publishedDate":"2020-11-16 17:15:00","lastModifiedDate":"2020-11-23 17:17:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4.3,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":1.4},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4.3},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ibm:sterling_file_gateway:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0.0.0","versionEndIncluding":"6.0.3.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ibm:sterling_file_gateway:*:*:*:*:*:*:*:*","versionStartIncluding":"2.2.0.0","versionEndIncluding":"2.2.6.5","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"4763","Ordinal":"164791","Title":"CVE-2020-4763","CVE":"CVE-2020-4763","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"4763","Ordinal":"1","NoteData":"IBM Sterling File Gateway 6.0.0.0 through 6.0.3.2 and 2.2.0.0 through 2.2.6.5 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 188897.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"4763","Ordinal":"2","NoteData":"2020-11-16","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"4763","Ordinal":"3","NoteData":"2020-11-16","Type":"Other","Title":"Modified"}]}}}