IBM Security Verify Access could allow a user, using man in the middle techniques, to obtain sensitive information or possibly change some information due to improper validiation of JWT tokens.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://www.ibm.com/support/pages/node/6568043 | patch vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/217226 | vdb entry vendor advisory |