ESB-2017.1804 - [Win][IBM i][HP-UX][Solaris][AIX] IBM WebSphere Portal : Multiple vulnerabilities 2017-07-24

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.1804
          Security Bulletin: Multiple Vulnerabilities affect IBM
                    WebSphere Portal Rich Media Edition
                               24 July 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM WebSphere Portal
Publisher:         IBM
Operating System:  AIX
                   HP-UX
                   IBM i
                   Solaris
                   Windows
                   z/OS
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated      
                   Access Privileged Data          -- Remote/Unauthenticated      
                   Denial of Service               -- Remote/Unauthenticated      
                   Cross-site Scripting            -- Remote with User Interaction
                   Provide Misleading Information  -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-6810 CVE-2016-3088 CVE-2016-2175
                   CVE-2016-0782 CVE-2016-0734 CVE-2015-8797
                   CVE-2015-8796 CVE-2015-8795 CVE-2015-7940
                   CVE-2015-5254 CVE-2015-0254 CVE-2014-3628
                   CVE-2014-3625 CVE-2014-3578 

Reference:         ESB-2016.1730
                   ESB-2015.3119
                   ESB-2015.2277

Original Bulletin: 
   http://www.ibm.com/support/docview.wss?uid=swg22005279

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: Multiple Vulnerabilities affect IBM WebSphere Portal Rich
Media Edition

Security Bulletin

Document information

More support for:

WebSphere Portal

Software version:

8.0, 8.5

Operating system(s):

AIX, HP-UX, IBM i, Linux, Solaris, Windows, z/OS

Reference #:

2005279

Modified date:

20 July 2017

Summary

Multiple vulnerabilities affect IBM WebSphere Portal if Rich Media Edition is
used.

Vulnerability Details

CVEID:

CVE-2015-7940

DESCRIPTION:

Bouncy Castle could allow a remote attacker to obtain sensitive information.
An attacker could exploit this vulnerability using an invalid curve attack to
extract private keys used in elliptic curve cryptography and obtain sensitive
information.

CVSS Base Score: 5.3

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/107739

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID:

CVE-2014-3578

DESCRIPTION:

Pivotal Spring Framework could allow a remote attacker to traverse
directories on the system. An attacker could send a specially-crafted URL
request to view arbitrary files on the system.

CVSS Base Score: 5

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/93774

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVEID:

CVE-2014-3625

DESCRIPTION:

Pivotal Spring Framework could allow a remote attacker to traverse
directories on the system. An attacker could send a specially-crafted URL
request containing "dot dot" sequences (/../) to view arbitrary files on the
system.

CVSS Base Score: 5

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/99872

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVEID:

CVE-2016-2175

DESCRIPTION:

Apache PDFBox could allow a remote authenticated attacker to obtain sensitive
information, caused by a XML external entity (XXE) error when processing XML
data by the XML parser. A remote attacker could exploit this vulnerability to
read arbitrary files on the system or cause a denial of service.

CVSS Base Score: 5.3

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/113548

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID:

CVE-2015-8795

DESCRIPTION:

Apache Solr is vulnerable to cross-site scripting, caused by improper
validation of user-supplied input by the Admin UI Schema-Browser page and
Analysis page. A remote attacker could exploit this vulnerability to inject
malicious script into a Web page which would be executed in a victim's Web
browser within the security context of the hosting Web site, once the page is
viewed. An attacker could use this vulnerability to steal the victim's
cookie-based authentication credentials.

CVSS Base Score: 6.1

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/108185

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)

CVEID:

CVE-2015-8796

DESCRIPTION:

Apache Solr is vulnerable to cross-site scripting, caused by improper
validation of user-supplied input by the schema-browser page. A remote
attacker could exploit this vulnerability to inject malicious script into a
Web page which would be executed in a victim's Web browser within the
security context of the hosting Web site, once the page is viewed. An
attacker could use this vulnerability to steal the victim's cookie-based
authentication credentials.

CVSS Base Score: 6.1

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/110295

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)

CVEID:

CVE-2015-8797

DESCRIPTION:

Apache Solr is vulnerable to cross-site scripting, caused by improper
validation of user-supplied input by the plugins/stats page. A remote
attacker could exploit this vulnerability to inject malicious script into a
Web page which would be executed in a victim's Web browser within the
security context of the hosting Web site, once the page is viewed. An
attacker could use this vulnerability to steal the victim's cookie-based
authentication credentials.

CVSS Base Score: 6.1

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/110296

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)

CVEID:

CVE-2014-3628

DESCRIPTION:

Apache Solr is vulnerable to cross-site scripting, caused by improper
validation of user-supplied input by the Admin UI Plugin / Stats page. A
remote attacker could exploit this vulnerability using the fieldvaluecache
object to execute script in a victim's Web browser within the security
context of the hosting Web site, once the URL is clicked. An attacker could
use this vulnerability to steal the victim's cookie-based authentication
credentials.

CVSS Base Score: 4.3

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/99866

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVEID:

CVE-2015-0254

DESCRIPTION:

Apache Standard Taglibs could allow a remote attacker to execute arbitrary
code on the system, caused by an XML External Entity Injection (XXE) error
when processing XML data. By sending specially-crafted XML data, an attacker
could exploit this vulnerability to execute arbitrary code on the system.

CVSS Base Score: 7.5

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/101550

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVEID:

CVE-2015-5254

DESCRIPTION:

Apache ActiveMQ could allow a remote attacker to execute arbitrary code on
the system, caused by the failure to restrict the classes that can be
serialized in the broker. An attacker could exploit this vulnerability using
a specially crafted serialized Java Message Service (JMS) ObjectMessage
object to execute arbitrary code on the system.

CVSS Base Score: 7.3

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/109632

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)

CVEID:

CVE-2016-0734

DESCRIPTION:

Apache ActiveMQ could allow a remote attacker to hijack the clicking action
of the victim, caused by the failure to set the X-Frame-Options header in
HTTP responses by the Administrative Web console. By persuading a victim to
visit a malicious Web site, a remote attacker could exploit this
vulnerability to hijack the victim's click actions.

CVSS Base Score: 4.3

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/111421

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N)

CVEID:

CVE-2016-0782

DESCRIPTION:

Apache ActiveMQ is vulnerable to cross-site scripting, caused by improper
validation of user-supplied input by the web based administration console. A
remote attacker could exploit this vulnerability using a specially-crafted
URL to execute script in a victim's Web browser within the security context
of the hosting Web site, once the URL is clicked. An attacker could use this
vulnerability to steal the victim's cookie-based authentication credentials.

CVSS Base Score: 6.1

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/111420

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)

CVEID:

CVE-2016-3088

DESCRIPTION:

Apache ActiveMQ could allow a remote attacker to execute arbitrary code on
the system, caused by an error in the Fileserver web application. By sending
a specially crafted HTTP PUT request and an HTTP MOVE request, an attacker
could exploit this vulnerability to create an arbitrary file and execute
arbitrary code on the system.

CVSS Base Score: 7.3

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/113414

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)

CVEID:

CVE-2016-6810

DESCRIPTION:

Apache ActiveMQ is vulnerable to cross-site scripting, caused by improper
validation of user-supplied input. A remote attacker could exploit this
vulnerability in a specially-crafted URL to execute script in a victim's Web
browser within the security context of the hosting Web site, once the URL is
clicked. An attacker could use this vulnerability to steal the victim's
cookie-based authentication credentials.

CVSS Base Score: 6.1

CVSS Temporal Score: See

https://exchange.xforce.ibmcloud.com/vulnerabilities/119699

for the current score

CVSS Environmental Score*: Undefined

CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)

Affected Products and Versions

IBM WebSphere Portal 8.5*

IBM WebSphere Portal 8.0*

* only if Rich Media Edition is used.


Remediation/Fixes

Product               VRMF                   APARs    Fix
IBM WebSphere Portal  8.5.0                  None     Upgrade to Cumulative Fix 14 (CF14), which removes the vulnerable components from the product.
                                                      (Combined Cumulative Fixes for WebSphere Portal 8.5.0.0)
IBM WebSphere Portal  8.0.0 through 8.0.0.1  None     Upgrade to Cumulative Fix 22 (CF22), which removes the vulnerable components from the product.
                                                      (Combined Cumulative Fixes for WebSphere Portal 8.0.0.1)


Workarounds and Mitigations

None



Important note

IBM strongly suggests that all System z customers be subscribed to the System
z Security Portal to receive the latest critical System z security and
integrity service. If you are not subscribed, see the instructions on the
System z Security web site . Security and integrity APARs and associated
fixes will be posted to this portal. IBM suggests reviewing the CVSS scores
and applying all security or integrity fixes as soon as possible to minimize
any potential risk.

References

Complete CVSS v2 Guide


On-line Calculator v2


Complete CVSS v3 Guide


On-line Calculator v3



Related information

IBM Secure Engineering Web Portal


IBM Product Security Incident Response Blog



Change History

20 July 2017: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=hs1U
-----END PGP SIGNATURE-----

« Back to bulletins