From f298c4e3b8899cd28349ecc02f37985fe3d2f1a5 Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Mon, 27 Jun 2022 11:58:08 -0400 Subject: [PATCH] Enhancement: cves/2021/CVE-2021-27748.yaml by mp --- cves/2021/CVE-2021-27748.yaml | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/cves/2021/CVE-2021-27748.yaml b/cves/2021/CVE-2021-27748.yaml index 51ee443d01..a90d3733d7 100644 --- a/cves/2021/CVE-2021-27748.yaml +++ b/cves/2021/CVE-2021-27748.yaml @@ -1,14 +1,15 @@ id: CVE-2021-27748 info: - name: IBM WebSphere Portal SSRF + name: IBM WebSphere HCL Digital Experience - Server-Side Request Forgery author: pdteam severity: high description: | - A Server Side Request Forgery vulnerability affects HCL Digital Experience, on-premise deployments and containers. + IBM WebSphere HCL Digital Experience is susceptible to a server-side request forgery vulnerability that impacts on-premise deployments and containers. reference: - https://blog.assetnote.io/2021/12/26/chained-ssrf-websphere/ - https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0095665 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27748 classification: cve-id: CVE-2021-27748 tags: cve,cve2021,hcl,ibm,ssrf,websphere @@ -30,4 +31,6 @@ requests: - type: word words: - - "

Interactsh Server

" \ No newline at end of file + - "

Interactsh Server

" + +# Enhanced by mp on 2022/06/27