Total vulnerabilities in the database
IBM Business Process Manager (BPM) 8.0.x through 8.0.1.3, 8.5.0 through 8.5.0.1, 8.5.5 through 8.5.5.0, and 8.5.6 through 8.5.6.0, when external Enterprise Content Management (ECM) integration is enabled with a certain technical system account configuration, allows remote authenticated users to bypass intended document-access restrictions via a (1) upload or (2) download action.
Software | From | Fixed in |
---|---|---|
ibm / business_process_manager | 8.5.5.0 | 8.5.5.0.x |
ibm / business_process_manager | 8.5.0.1 | 8.5.0.1.x |
ibm / business_process_manager | 8.0.1.2 | 8.0.1.2.x |
ibm / business_process_manager | 8.0.1.3 | 8.0.1.3.x |
ibm / business_process_manager | 8.0.0.0 | 8.0.0.0.x |
ibm / business_process_manager | 8.5.0.0 | 8.5.0.0.x |
ibm / business_process_manager | 8.0.1.0 | 8.0.1.0.x |
ibm / business_process_manager | 8.5.6.0 | 8.5.6.0.x |
ibm / business_process_manager | 8.0.1.1 | 8.0.1.1.x |