IBM Cognos Business Intelligence (BI) 8.4.1 before IF1, 10.1 before IF2, 10.1.1 before IF2, and 10.2 before IF1 allows remote authenticated users to conduct XPath injection attacks, and read arbitrary XML files, via unspecified vectors.
References
Configurations
Configuration 1 (hide)
|
Information
Published : 2013-03-04 21:02
Updated : 2017-08-28 18:32
NVD link : CVE-2012-4837
Mitre link : CVE-2012-4837
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
ibm
- cognos_business_intelligence