{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T03:44:12.465","vulnerabilities":[{"cve":{"id":"CVE-2020-4640","sourceIdentifier":"psirt@us.ibm.com","published":"2021-02-04T17:15:13.623","lastModified":"2024-11-21T05:33:01.740","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Certain IBM API Connect 10.0.0.0 through 10.0.1.0 and 2018.4.1.0 through 2018.4.1.13 configurations can result in sensitive information in the URL fragment identifiers. This information can be cached in the intermediate nodes like proxy servers, cdn, logging platforms, etc. An attacker can make use of this information to perform attacks by impersonating a user. IBM X-Force ID: 185510."},{"lang":"es","value":"Determinadas configuraciones de IBM API Connect versiones 10.0.0.0 hasta 10.0.1.0 y versiones 2018.4.1.0 hasta 2018.4.1.13, pueden resultar en información confidencial en los identificadores de fragmentos de URL.&#xa0;Esta información puede ser almacenada en caché en los nodos intermedios como servidores proxy, cdn, plataformas de registro, etc. Un atacante puede hacer uso de esta información para realizar ataques haciéndose pasar por un usuario.&#xa0;IBM X-Force ID: 185510"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N","baseScore":4.1,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":1.5,"impactScore":2.5}],"cvssMetricV30":[{"source":"psirt@us.ibm.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N","baseScore":3.4,"baseSeverity":"LOW","attackVector":"ADJACENT_NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":0.9,"impactScore":2.5}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:A/AC:M/Au:S/C:P/I:P/A:N","baseScore":3.8,"accessVector":"ADJACENT_NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":4.4,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-200"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:api_connect:*:*:*:*:*:*:*:*","versionStartIncluding":"2018.4.1.0","versionEndIncluding":"2018.4.1.13","matchCriteriaId":"403B95C9-40E9-4F9D-AE7D-5B3BC2ECE8A5"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:api_connect:10.0.0.0:*:*:*:*:*:*:*","matchCriteriaId":"AF48BB29-806D-4613-A1D8-77462461245E"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:api_connect:10.0.1.0:*:*:*:*:*:*:*","matchCriteriaId":"594C5FF7-61BC-409D-A77D-5BDC53CEFE09"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/185510","source":"psirt@us.ibm.com","tags":["VDB Entry","Vendor Advisory"]},{"url":"https://www.ibm.com/support/pages/node/6410486","source":"psirt@us.ibm.com","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/185510","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["VDB Entry","Vendor Advisory"]},{"url":"https://www.ibm.com/support/pages/node/6410486","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}