IBM Business Process Manager 7.5.x, 8.0.x, 8.5.0, 8.5.5, and 8.5.6.0 through cumulative fix 2 allow remote authenticated users to delete process and task data by leveraging incorrect authorization checks. IBM X-Force ID: 108393.
The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Business_process_manager | Ibm | 7.5.0.0 (including) | 7.5.0.0 (including) |
Business_process_manager | Ibm | 7.5.0.1 (including) | 7.5.0.1 (including) |
Business_process_manager | Ibm | 7.5.1.0 (including) | 7.5.1.0 (including) |
Business_process_manager | Ibm | 7.5.1.1 (including) | 7.5.1.1 (including) |
Business_process_manager | Ibm | 7.5.1.2 (including) | 7.5.1.2 (including) |
Business_process_manager | Ibm | 8.0.0.0 (including) | 8.0.0.0 (including) |
Business_process_manager | Ibm | 8.0.1.0 (including) | 8.0.1.0 (including) |
Business_process_manager | Ibm | 8.0.1.1 (including) | 8.0.1.1 (including) |
Business_process_manager | Ibm | 8.0.1.2 (including) | 8.0.1.2 (including) |
Business_process_manager | Ibm | 8.0.1.3 (including) | 8.0.1.3 (including) |
Business_process_manager | Ibm | 8.5.0.0 (including) | 8.5.0.0 (including) |
Business_process_manager | Ibm | 8.5.0.1 (including) | 8.5.0.1 (including) |
Business_process_manager | Ibm | 8.5.0.2 (including) | 8.5.0.2 (including) |
Business_process_manager | Ibm | 8.5.5.0 (including) | 8.5.5.0 (including) |
Business_process_manager | Ibm | 8.5.6.0 (including) | 8.5.6.0 (including) |
Assuming a user with a given identity, authorization is the process of determining whether that user can access a given resource, based on the user’s privileges and any permissions or other access-control specifications that apply to the resource. When access control checks are not applied consistently - or not at all - users are able to access data or perform actions that they should not be allowed to perform. This can lead to a wide range of problems, including information exposures, denial of service, and arbitrary code execution.