CVE Vulnerabilities

CVE-2018-1694

Published: Nov 06, 2018 | Modified: Aug 24, 2020
CVSS 3.x
5.9
MEDIUM
Source:
NVD
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
Ubuntu

IBM Jazz applications (IBM Rational Collaborative Lifecycle Management 5.0 through 5.02 and 6.0 through 6.0.6, IBM Rational DOORS Next Generation 5.0 through 5.02 and 6.0 through 6.0.6, IBM Rational Engineering Lifecycle Manager 5.0 through 5.02 and 6.0 through 6.0.6, IBM Rational Quality Manager 5.0 through 5.02 and 6.0 through 6.0.6, IBM Rational Rhapsody Design Manager 5.0 through 5.02 and 6.0 through 6.0.6, IBM Rational Software Architect Design Manager 5.0 through 5.02 and 6.0 through 6.0.1, IBM Rational Team Concert 5.0 through 5.02 and 6.0 through 6.0.6) could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 145609.

Affected Software

Name Vendor Start Version End Version
Rational_collaborative_lifecycle_management Ibm 5.0.0 (including) 6.0.6 (including)
Rational_doors_next_generation Ibm 5.0.0 (including) 5.0.2 (including)
Rational_doors_next_generation Ibm 6.0.0 (including) 6.0.6 (including)
Rational_engineering_lifecycle_manager Ibm 5.0.0 (including) 5.0.2 (including)
Rational_engineering_lifecycle_manager Ibm 6.0.0 (including) 6.0.6 (including)
Rational_quality_manager Ibm 5.0.0 (including) 5.0.2 (including)
Rational_quality_manager Ibm 6.0.0 (including) 6.0.6 (including)
Rational_rhapsody_design_manager Ibm 5.0.0 (including) 5.0.2 (including)
Rational_rhapsody_design_manager Ibm 6.0.0 (including) 6.0.6 (including)
Rational_software_architect_design_manager Ibm 5.0.0 (including) 5.0.2 (including)
Rational_software_architect_design_manager Ibm 6.0.0 (including) 6.0.1 (including)
Rational_team_concert Ibm 5.0.0 (including) 5.0.2 (including)
Rational_team_concert Ibm 6.0.0 (including) 6.0.6 (including)

References