{"vuid":"VU#596990","idnumber":"596990","name":"IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway contain a URL redirection vulnerability","keywords":["IBM","tivoli","TFIM","TFIMBG","identity manager","url redirect","CWE-601"],"overview":"IBM Tivoli Federated Identity Manager version 6.22 and possibly earlier versions, and IBM Tivoli Federated Identity Manager Business Gateway version 6.2.2 and possibly earlier versions contain a URL redirection (CWE-601) vulnerability.","clean_desc":"CWE-601: URL Redirection to Untrusted Site ('Open Redirect') IBM Tivoli Federated Identity Manager (TFIM) version 6.22 and possibly earlier versions, and IBM Tivoli Federated Identity Manager Business Gateway (TFIMBG) version 6.2.2 and possibly earlier versions contain a URL redirection vulnerability. An attacker can append a link to the Identity Manager URL which may cause the user to be redirected to a site with malicious content or scripts.","impact":"A remote unauthenticated attacker may be able to redirect a user to a website that contains malicious content or scripts.","resolution":"Apply an Update\nIBM has released an advisory detailing the vulnerability and offers patched versions of TFIM and TFIMBG to address this vulnerability.","workarounds":"","sysaffected":"","thanks":"Thanks to Mukhammed Khalilov of Help AG Middle East for reporting this vulnerability.","author":"This document was written by Adam Rauf.","public":["http://www-01.ibm.com/support/docview.wss?uid=swg21654114","http://cwe.mitre.org/data/definitions/601.html"],"cveids":["CVE-2013-5431"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2013-09-23T19:26:43Z","publicdate":"2013-10-28T00:00:00Z","datefirstpublished":"2013-11-07T14:05:43Z","dateupdated":"2014-07-24T23:15:07Z","revision":22,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"M","cvss_authentication":null,"cvss_confidentialityimpact":"N","cvss_integrityimpact":"P","cvss_availabilityimpact":"N","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"L","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"4.3","cvss_basevector":"AV:N/AC:M/Au:N/C:N/I:P/A:N","cvss_temporalscore":"3.4","cvss_environmentalscore":"0.84096704034","cvss_environmentalvector":"CDP:ND/TD:L/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}