ESB-2018.1716 - [Win][Linux][HP-UX][Solaris][AIX] IBM FileNet Content Manager and Content Engine: Multiple vulnerabilities 2018-06-08

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.1716
        Security vulnerabilities identified in IBM FileNet Content
                      Manager and Content Foundation
                                8 June 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM FileNet Content Manager
                   IBM Content Engine
Publisher:         IBM
Operating System:  AIX
                   HP-UX
                   Linux variants
                   Solaris
                   Windows
Impact/Access:     Denial of Service        -- Remote with User Interaction
                   Cross-site Scripting     -- Existing Account            
                   Access Confidential Data -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-2806 CVE-2018-2801 CVE-2018-2768
                   CVE-2018-1556 CVE-2018-1555 CVE-2018-1542

Reference:         ASB-2018.0083

Original Bulletin: 
   https://www-01.ibm.com/support/docview.wss?uid=swg22015943
   https://www-01.ibm.com/support/docview.wss?uid=swg22015721

Comment: This bulletin contains two (2) IBM security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: IBM FileNet Content Manager and IBM Content Foundation are
affected by multiple vulnerabilities in the Administration Console for Content
Platform Engine (ACCE)

More support for: FileNet P8 Platform
                  Content Engine
Software version: 5.2.1, 5.5.0
Operating system(s): AIX, HP-UX, Linux, Solaris, Windows
Reference #: 2015943
Modified date: 06 June 2018

Security Bulletin

Summary

The IBM FileNet Content Manager and IBM Content Foundation component
"Administration Console for Content Platform Engine" (ACCE), is affected by
multiple security vulnerabilities.

Vulnerability Details

Advisory CVEs:
CVEID: CVE-2018-1542
DESCRIPTION: The Administration Console for Content Platform Engine (ACCE)
included in the IBM FileNet Content Manager and IBM Content Foundation
products, is vulnerable to a XML External Entity Injection (XXE) attack when
processing XML data. A remote attacker could exploit this vulnerability to
expose sensitive information or consume memory resources.
CVSS Base Score: 7.1
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/142597 for the current
score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L)


CVEID: CVE-2018-1555
DESCRIPTION: IBM FileNet Content Manager is vulnerable to cross-site scripting.
This vulnerability allows users to embed arbitrary JavaScript code in the Web
UI thus altering the intended functionality potentially leading to credentials
disclosure within a trusted session.
CVSS Base Score: 5.4
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/142892 for the current
score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)


CVEID: CVE-2018-1556
DESCRIPTION: IBM FileNet Content Manager is vulnerable to cross-site scripting.
This vulnerability allows users to embed arbitrary JavaScript code in the Web
UI thus altering the intended functionality potentially leading to credentials
disclosure within a trusted session.
CVSS Base Score: 5.4
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/142893 for the current
score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)

Affected Products and Versions

IBM FileNet Content Manager 5.2.1, 5.5.0

IBM Content Foundation 5.2.1, 5.5.0

Remediation/Fixes

IBM recommends upgrading to a supported version/release/plaform of the product
that contains the fixes to these vulnerabilities.

+-----------------------------------+--------+------------+--------------------------------+
|Product                            |VRMF    |APAR        |Remediation/First Fix           |
+-----------------------------------+--------+------------+--------------------------------+
|IBM FileNet Content Manager        |5.2.1   |PJ45334     |5.2.1.7-P8CPE-IF002 - 5/24/2018 |
+-----------------------------------+--------+------------+--------------------------------+
|IBM Content Foundation             |5.2.1   |PJ45334     |5.2.1.7-P8CPE-IF002 - 5/24/2018 |
+-----------------------------------+--------+------------+--------------------------------+

In the above table, the APAR links will provide more information about the fix

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

Subscribe to My Notifications to be notified of important product support
alerts like this.

Important note

IBM strongly suggests that all System z customers be subscribed to the System z
Security Portal to receive the latest critical System z security and integrity
service. If you are not subscribed, see the instructions on the System z
Security web site. Security and integrity APARs and associated fixes will be
posted to this portal. IBM suggests reviewing the CVSS scores and applying all
security or integrity fixes as soon as possible to minimize any potential risk.

References

Complete CVSS v3 Guide
On-line Calculator v3

Related information

IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Acknowledgement

Jayson Grace

Change History

24 May 2018: Original Version Published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF
ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY
ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

                          Cross reference information
     Segment         Product   Component        Platform        Version Edition
Enterprise Content Content     Content   AIX, HP-UX, Linux,     5.5.0,
    Management     Foundation  Engine    Solaris, Windows       5.2.1

- -------------------------------------------------------------------------------

Security Bulletin: Multiple vulnerabilities may affect Oracle Outside In
Technology (OIT) Version 8.5.3 used by IBM FileNet Content Manager and IBM
Content Foundation

More support for: FileNet Content Manager
                  Content Engine
Software version: 5.2.1, 5.5.0
Operating system(s): AIX, HP-UX, Linux, Solaris, Windows
Reference #: 2015721
Modified date: 06 June 2018

Security Bulletin

Summary

Security Bulletin: Multiple vulnerabilities may affect Oracle Outside In
Technology (OIT) Version 8.5.3 used by IBM FileNet Content Manager and IBM
Content Foundation.
Oracle OIT issues disclosed in the Oracle April 2018 Critical Patch Update.

Vulnerability Details

Advisory CVEs:

CVEID: CVE-2018-2768
DESCRIPTION: An unspecified vulnerability in Oracle Fusion Middleware related
to the Outside In Technology Outside In Filters component could allow an
unauthenticated attacker to cause high confidentiality impact, no integrity
impact, and low availability impact.
CVSS Base Score: 7.1
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/141924 for the current
score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L)

CVEID: CVE-2018-2801
DESCRIPTION: An unspecified vulnerability in Oracle Fusion Middleware related
to the Outside In Technology Outside In Image Export SDK component could allow
an unauthenticated attacker to cause high confidentiality impact, no integrity
impact, and low availability impact.
CVSS Base Score: 7.1
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/141957 for the current
score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L)

CVEID: CVE-2018-2806
DESCRIPTION: An unspecified vulnerability in Oracle Fusion Middleware related
to the Outside In Technology Outside In Filters component could allow an
unauthenticated attacker to cause high confidentiality impact, no integrity
impact, and low availability impact.
CVSS Base Score: 7.1
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/141962 for the current
score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L)

Affected Products and Versions

FileNet Content Manager 5.2.1, 5.5.0
IBM Content Foundation 5.2.1, 5.5.0

Remediation/Fixes

To resolve these vulnerabilities, install one of the patch sets listed below to
upgrade Oracle Outside In Technology (OIT) to the April 2018 v8.5.3 patch
27695571 release.

+--------------------------------+---------+------------+--------------------------------+
|Product                         |VRMF     |APAR        |Remediation/First Fix           |
+--------------------------------+---------+------------+--------------------------------+
|FileNet Content Manager         |5.2.1    |PJ45337     |5.2.1.7-P8CPE-IF002 - 5/24/2018 |
|                                |         |PJ45338     |5.2.1.7-P8CSS-IF002 - 5/24/2018 |
+--------------------------------+---------+------------+--------------------------------+
|IBM Content Foundation          |5.2.1    | PJ45337    |5.2.1.7-P8CPE-IF002 - 5/24/2018 |
|                                |         |PJ45338     |5.2.1.7-P8CSS-IF002 - 5/24/2018 |
+--------------------------------+---------+------------+--------------------------------+

In the above table, the APAR links will provide more information about the fix.

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

Subscribe to My Notifications to be notified of important product support
alerts like this.

Important note

IBM strongly suggests that all System z customers be subscribed to the System z
Security Portal to receive the latest critical System z security and integrity
service. If you are not subscribed, see the instructions on the System z
Security web site. Security and integrity APARs and associated fixes will be
posted to this portal. IBM suggests reviewing the CVSS scores and applying all
security or integrity fixes as soon as possible to minimize any potential risk.

References

Complete CVSS v3 Guide
On-line Calculator v3

Related information

IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog


Change History

6 June, 2018 - initial release

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF
ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY
ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

                          Cross reference information
    Segment         Product      Component        Platform       Version Edition
   Enterprise    FileNet       Content       AIX, HP-UX, Linux,  5.5.0,
    Content      Content       Search        Solaris, Windows    5.2.1
   Management    Manager       Services
   Enterprise    Content       Content                           5.5.0,
    Content      Foundation    Engine                            5.2.1
   Management
   Enterprise    Content       Content                           5.5.1,
    Content      Foundation    Search                            5.2.1
   Management                  Services

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=oZfD
-----END PGP SIGNATURE-----

« Back to bulletins