SB2025080618 - Multiple vulnerabilities in IBM QRadar SIEM
Published: August 6, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Cross-site scripting (CVE-ID: CVE-2025-33118)
The disclosed vulnerability allows a remote user to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data. The vulnerability allows remote users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
2) Resource exhaustion (CVE-ID: CVE-2011-5034)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to Apache Geronimo computes hash values for form parameters without restricting the ability to trigger hash collisions predictablys. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
3) Infinite loop (CVE-ID: CVE-2024-25710)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop when processing a corrupt DUMP file. A remote attacker can consume all available system resources and cause denial of service conditions.
4) Resource exhaustion (CVE-ID: CVE-2024-26308)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of memory when unpacking a broken Pack200 file. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
5) Cryptographic issues (CVE-ID: CVE-2011-4461)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to Jetty computes hash values for form parameters without restricting the ability to trigger hash collisions predictably. A remote attacker can cause a denial of service (CPU consumption) by sending many crafted parameters.
Remediation
Install update from vendor's website.