CVE-2013-0580
Severity CVSS v4.0:
Pending analysis
Type:
CWE-352
Cross-Site Request Forgery (CSRF)
Publication date:
10/10/2013
Last modified:
11/04/2025
Description
Cross-site request forgery (CSRF) vulnerability in the Optim E-Business Console in IBM Data Growth Solution for Oracle E-business Suite 6.0 through 9.1 allows remote authenticated users to hijack the authentication of arbitrary users.
Impact
Base Score 2.0
4.90
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:ibm:infosphere_optim_data_growth_for_oracle_e-business_suite:6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ibm:infosphere_optim_data_growth_for_oracle_e-business_suite:6.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ibm:infosphere_optim_data_growth_for_oracle_e-business_suite:6.3.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ibm:infosphere_optim_data_growth_for_oracle_e-business_suite:6.3.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ibm:infosphere_optim_data_growth_for_oracle_e-business_suite:6.3.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ibm:infosphere_optim_data_growth_for_oracle_e-business_suite:6.4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ibm:infosphere_optim_data_growth_for_oracle_e-business_suite:6.4.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ibm:infosphere_optim_data_growth_for_oracle_e-business_suite:6.5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ibm:infosphere_optim_data_growth_for_oracle_e-business_suite:6.5.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ibm:infosphere_optim_data_growth_for_oracle_e-business_suite:7.1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ibm:infosphere_optim_data_growth_for_oracle_e-business_suite:7.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ibm:infosphere_optim_data_growth_for_oracle_e-business_suite:7.1.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ibm:infosphere_optim_data_growth_for_oracle_e-business_suite:7.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ibm:infosphere_optim_data_growth_for_oracle_e-business_suite:7.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ibm:infosphere_optim_data_growth_for_oracle_e-business_suite:7.2.2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



