IBM Sterling Connect:Direct Web Services 6.1.0, 6.2.0, and 6.3.0
does not invalidate session after a browser closure which could allow an authenticated user to impersonate another user on the system.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://www.ibm.com/support/pages/node/7231178 |
|
History
Fri, 18 Jul 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ibm aix
Linux Linux linux Kernel Microsoft Microsoft windows |
|
| CPEs | cpe:2.3:a:ibm:sterling_connect_direct_web_services:*:*:*:*:*:*:*:* cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Ibm aix
Linux Linux linux Kernel Microsoft Microsoft windows |
Fri, 18 Apr 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 18 Apr 2025 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | IBM Sterling Connect:Direct Web Services 6.1.0, 6.2.0, and 6.3.0 does not invalidate session after a browser closure which could allow an authenticated user to impersonate another user on the system. | |
| Title | IBM Sterling Connect:Direct Web Services session fixation | |
| First Time appeared |
Ibm
Ibm sterling Connect Direct Web Services |
|
| Weaknesses | CWE-613 | |
| CPEs | cpe:2.3:a:ibm:sterling_connect_direct_web_services:6.1.0.0:*:*:*:*:unix:*:* cpe:2.3:a:ibm:sterling_connect_direct_web_services:6.1.0.0:*:*:*:*:windows:*:* cpe:2.3:a:ibm:sterling_connect_direct_web_services:6.2.0.0:*:*:*:*:unix:*:* cpe:2.3:a:ibm:sterling_connect_direct_web_services:6.2.0.0:*:*:*:*:windows:*:* cpe:2.3:a:ibm:sterling_connect_direct_web_services:6.3.0.0:*:*:*:*:unix:*:* cpe:2.3:a:ibm:sterling_connect_direct_web_services:6.3.0.0:*:*:*:*:windows:*:* |
|
| Vendors & Products |
Ibm
Ibm sterling Connect Direct Web Services |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: ibm
Published: 2025-04-18T11:04:55.508Z
Updated: 2025-09-01T00:41:10.652Z
Reserved: 2024-09-03T13:50:26.295Z
Link: CVE-2024-45651
Updated: 2025-04-18T11:26:30.509Z
Status : Analyzed
Published: 2025-04-18T11:15:44.940
Modified: 2025-07-18T14:16:12.850
Link: CVE-2024-45651
No data.