{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T09:19:27.219","vulnerabilities":[{"cve":{"id":"CVE-2013-6720","sourceIdentifier":"psirt@us.ibm.com","published":"2014-03-06T11:55:05.100","lastModified":"2025-04-12T10:46:40.837","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Directory traversal vulnerability in download.php in the Passive Capture Application (PCA) web console in IBM Tealeaf CX 7.x, 8.x through 8.6, 8.7 before FP2, and 8.8 before FP2 allows remote authenticated users to bypass intended access restrictions via a .. (dot dot) in the log parameter, as demonstrated using a crafted request for a customer-support file, as demonstrated by a log file."},{"lang":"es","value":"Una vulnerabilidad de salto de directorio en el archivo download.php en la consola web Passive Capture Application (PCA) en Tealeaf CX de IBM versiones 7.x, versiones 8.x hasta 8.6, versión 8.7 anterior a FP2 y versión 8.8 anterior a FP2, permite a los usuarios autenticados remotos omitir las restricciones de acceso previstas por medio de .. (punto punto) en el parámetro log, como se demuestra usando una petición diseñada para un archivo de soporte al cliente, como es demostrado por un archivo de registro."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:N","baseScore":5.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:tealeaf_cx:7.1:*:*:*:*:*:*:*","matchCriteriaId":"73F221E7-D026-497A-9E31-80316209F47C"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:tealeaf_cx:7.2:*:*:*:*:*:*:*","matchCriteriaId":"CE1B92C7-F61A-428F-986A-826AA55E3DF5"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:tealeaf_cx:8.0:*:*:*:*:*:*:*","matchCriteriaId":"DE9DFC4D-402A-4E34-BBC1-EF52F06CF141"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:tealeaf_cx:8.1:*:*:*:*:*:*:*","matchCriteriaId":"4C449AA9-EEC0-4A6C-80E0-994CD266299E"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:tealeaf_cx:8.2:*:*:*:*:*:*:*","matchCriteriaId":"6F39FE62-829E-4743-AEDC-04F8B96F42D0"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:tealeaf_cx:8.3:*:*:*:*:*:*:*","matchCriteriaId":"67EED387-1AF6-4900-90DC-664D0DC01D8C"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:tealeaf_cx:8.4:*:*:*:*:*:*:*","matchCriteriaId":"FBE26E75-B709-4435-A12D-86476DDBF7DF"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:tealeaf_cx:8.5:*:*:*:*:*:*:*","matchCriteriaId":"4F32997D-CF8A-4DA9-91D3-C4B793C203C2"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:tealeaf_cx:8.6:*:*:*:*:*:*:*","matchCriteriaId":"B5B9CB5C-0E75-45EB-B85D-7CF3EAE3C930"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:tealeaf_cx:8.7:*:*:*:*:*:*:*","matchCriteriaId":"DE939856-ADAA-442D-94E1-3BA1A6865496"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:tealeaf_cx:8.8:*:*:*:*:*:*:*","matchCriteriaId":"5E742288-47B2-4903-8881-E8E2700A4422"}]}]}],"references":[{"url":"http://www.exploit-db.com/exploits/32546","source":"psirt@us.ibm.com"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/89229","source":"psirt@us.ibm.com"},{"url":"https://tealeaf.support.ibmcloud.com/FileManagement/Download/19eb90ffb8334b398684b4350edc4b7a","source":"psirt@us.ibm.com","tags":["Vendor Advisory"]},{"url":"http://www.exploit-db.com/exploits/32546","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/89229","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://tealeaf.support.ibmcloud.com/FileManagement/Download/19eb90ffb8334b398684b4350edc4b7a","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}