-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2018.3512.2
           Multiple vulnerabilities patched in IBM Case Manager
                              9 November 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Case Manager
Publisher:         IBM
Operating System:  AIX
                   Linux variants
                   Solaris
                   Windows
Impact/Access:     Denial of Service        -- Remote/Unauthenticated
                   Cross-site Scripting     -- Existing Account      
                   Read-only Data Access    -- Remote/Unauthenticated
                   Access Confidential Data -- Remote/Unauthenticated
                   Unauthorised Access      -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-1884 CVE-2018-1844 CVE-2018-1794
                   CVE-2018-1793 CVE-2018-1777 CVE-2018-1770
                   CVE-2014-7810  

Reference:         ESB-2018.3436
                   ESB-2018.3324
                   ESB-2018.3222
                   ESB-2016.2364
                   ESB-2016.0133
                   ESB-2015.1822
                   ESB-2015.1318

Original Bulletin: 
   http://www.ibm.com/support/docview.wss?uid=ibm10737897
   http://www.ibm.com/support/docview.wss?uid=ibm10734193
   http://www.ibm.com/support/docview.wss?uid=ibm10736059
   http://www.ibm.com/support/docview.wss?uid=ibm10735793
   http://www.ibm.com/support/docview.wss?uid=ibm10736061
   http://www.ibm.com/support/docview.wss?uid=ibm10735791
   http://www.ibm.com/support/docview.wss?uid=ibm10735775

Comment: This bulletin contains seven (7) IBM security advisories.

Revision History:  November 9 2018: Added advisory ibm10735775 (CVE-2018-1770).
                   November 8 2018: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: Security Bulletin: A Zip Slip vulnerability is exposed in
Case Manager (CVE-2018-1884)

Security Bulletin

Document information
Software version: All Versions
Operating system(s): AIX, Linux, Solaris, Windows
Reference #: 0737897
Modified date: 07 November 2018

Summary

IBM Case Manager has addressed the following vulnerability. A Zip Slip
vulnerability is exposed in Case Manager with the ability to import solution
package zip files. (CVE-2018-1884)

Vulnerability Details

CVEID: CVE-2018-1884
DESCRIPTION: IBM Case Manager is vulnerabile to a "zip slip" vulnerability
which could allow a remote attacker to execute code using directory traversal
techniques.
CVSS Base Score: 4.8
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
151970 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L)

Affected Products and Versions

Affected IBM Case Manager Affected Versions
IBM Case Manager          5.3.X
IBM Case Manager          5.2.1
IBM Case Manager          5.2.0
IBM Case Manager          5.1.1

Remediation/Fixes

+-----------------------------------------------------------------------------+
|     Product      |       VRMF        |       APAR       | Remediation/First |
|                  |                   |                  |        Fix        |
|------------------+-------------------+------------------+-------------------|
|IBM Case Manager  |5.3.0.0 - 5.3.3.0  |PJ45456           |5.3.3.0-ICM-IF002  |
|                  |                   |                  |or later versions  |
|------------------+-------------------+------------------+-------------------|
|IBM Case Manager  |5.2.1.0 - 5.2.1.7  |PJ45494           |5.2.1.7-ICM-IF004  |
|                  |                   |                  |or later           |
|------------------+-------------------+------------------+-------------------|
|IBM Case Manager  |5.2.0.0 - 5.2.0.4  |PJ45495           |5.2.0.4-ICM-IF003  |
|                  |                   |                  |or later           |
+-----------------------------------------------------------------------------+

IBM Case Manager V5.1.1 is no longer in full support; IBM recommends upgrading
to a fixed, supported version/release/platform of the product.

Workarounds and Mitigations

The issue can be mitigated by doing the following:

 1. Ensuring that the handling of solution package zip files are well
    controlled, where the package is not exposed to modification.
 2. Generating and validating the checksum for the zip file at the source and
    target environment where the zip is to be exposed to the Case Manager
    product.

- -------------------------------------------------------------------------------

Security Bulletin: An XML External Entity (XXE) processing vulnerability is
exposed in Case Manager administration client (CVE-2018-1844)

Security Bulletin

Document information
Software version: All Versions
Operating system(s): AIX, Linux, Windows
Reference #: 0734193
Modified date: 07 November 2018

Summary

IBM Case Manager has addressed the following vulnerability. An XML External
Entity (XXE) processing vulnerability is exposed in Case Manager administration
client with the ability to import solution packaged which are FileNet
Deployment Manager exported zip packages. (CVE-2018-1844)

Vulnerability Details

CVEID: CVE-2018-1844
DESCRIPTION: IBM Case Manager is vulnerable to a XML External Entity Injection
(XXE) attack when processing XML data. A remote attacker could exploit this
vulnerability to expose sensitive information or consume memory resources.
CVSS Base Score: 7.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
150904 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L)

Affected Products and Versions

Affected IBM Case Manager Affected Versions
IBM Case Manager          5.3.X
IBM Case Manager          5.2.1
IBM Case Manager          5.2.0
IBM Case Manager          5.1.1

Remediation/Fixes

+-----------------------------------------------------------------------------+
|     Product      |       VRMF        |       APAR       | Remediation/First |
|                  |                   |                  |        Fix        |
|------------------+-------------------+------------------+-------------------|
|IBM Case Manager  |5.3.0.0 - 5.3.3.0  |PJ45232           |5.3.3.0-ICM-IF002  |
|                  |                   |                  |or later versions  |
|------------------+-------------------+------------------+-------------------|
|IBM Case Manager  |5.2.1.0 - 5.2.1.7  |PJ45226           |5.2.1.7-ICM-IF004  |
|                  |                   |                  |or later           |
|------------------+-------------------+------------------+-------------------|
|IBM Case Manager  |5.2.0.0 - 5.2.0.4  |PJ45548           |5.2.0.4-ICM-IF003  |
|                  |                   |                  |or later           |
+-----------------------------------------------------------------------------+

IBM Case Manager V5.1.1 is no longer in full support; IBM recommends upgrading
to a fixed, supported version/release/platform of the product.

Workarounds and Mitigations

The issue can be mitigated by preventing XXE injection into the solution zip
package in doing the following:

 1. Ensuring that the solution package export and import process is well
    controlled, where the package is not exposed to modification.
 2. Generating a checksum for the solution export zip package immediately after
    export, and validating the checksum prior to import to ensure package
    consistency.

Change History

06 Nov 2018: Original version published

- -------------------------------------------------------------------------------

Security Bulletin: A security vulnerability has been identified in IBM
WebSphere Application Server shipped with IBM Case Manager (CVE-2018-1794)

Security Bulletin

Document information
Software version: All Versions
Operating system(s): AIX, Linux, Solaris, Windows
Reference #: 0736059
Modified date: 07 November 2018

Summary

IBM WebSphere Application Server is shipped as a component of IBM Case Manager.
Information about a security vulnerability affecting IBM WebSphere Application
Server has been published in a security bulletin.

Vulnerability Details

Please consult the security bulletin Security Bulletin: Cross-site scripting
vulnerability in OAuth ear in WebSphere Application Server (CVE-2018-1794) for
vulnerability details and information about fixes.

Affected Products and Versions

+-----------------------------------------------------------------------+
|Principal Product and Versions     |Affected Supporting Product and    |
|                                   |Versions                           |
|-----------------------------------+-----------------------------------|
|IBM Case Manager 5.1.1             |IBM WebSphere Application Server   |
|IBM Case Manager 5.2.0             |7.0                                |
|IBM Case Manager 5.2.1             |IBM WebSphere Application Server   |
|IBM Case Manager 5.3.0             |8.0                                |
|IBM Case Manager 5.3.1             |IBM WebSphere Application Server   |
|IBM Case Manager 5.3.2             |8.5                                |
|IBM Case Manager 5.3.3             |IBM WebSphere Application Server   |
|                                   |9.0                                |
+-----------------------------------------------------------------------+

Acknowledgement

The vulnerability was reported to IBM by Benoit Ct-Jodoin

Change History

14 Nov, 2018: Original Version Published

- -------------------------------------------------------------------------------

Security Bulletin: A security vulnerability has been identified in IBM
WebSphere Application Server shipped with IBM Case Manager (CVE-2018-1793)

Security Bulletin

Document information
Software version: All Versions
Operating system(s): AIX, Linux, Solaris, Windows
Reference #: 0735793
Modified date: 07 November 2018

Summary

IBM WebSphere Application Server is shipped as a component of IBM Case Manager.
Information about a security vulnerability affecting IBM WebSphere Application
Server has been published in a security bulletin.

Vulnerability Details

Please consult the security bulletin Security Bulletin: Cross-site scripting
vulnerability in SAML ear in WebSphere Application Server (CVE-2018-1793) for
vulnerability details and information about fixes.

Affected Products and Versions

+-----------------------------------------------------------------------+
|Principal Product and Versions     |Affected Supporting Product and    |
|                                   |Versions                           |
|-----------------------------------+-----------------------------------|
|IBM Case Manager 5.1.1             |IBM WebSphere Application Server   |
|IBM Case Manager 5.2.0             |7.0                                |
|IBM Case Manager 5.2.1             |IBM WebSphere Application Server   |
|IBM Case Manager 5.3.0             |8.0                                |
|IBM Case Manager 5.3.1             |IBM WebSphere Application Server   |
|IBM Case Manager 5.3.2             |8.5                                |
|IBM Case Manager 5.3.3             |IBM WebSphere Application Server   |
|                                   |9.0                                |
+-----------------------------------------------------------------------+

Acknowledgement

The vulnerability was reported to IBM by Benoit Ct-Jodoin

Change History

14 Nov, 2018: Original Version Published

- -------------------------------------------------------------------------------

Security Bulletin: A security vulnerability has been identified in IBM
WebSphere Application Server shipped with IBM Case Manager (CVE-2018-1777)

Security Bulletin

Document information
Software version: All Versions
Operating system(s): AIX, Linux, Solaris, Windows
Reference #: 0736061
Modified date: 07 November 2018

Summary

IBM WebSphere Application Server is shipped as a component of IBM Case Manager.
Information about a security vulnerability affecting IBM WebSphere Application
Server has been published in a security bulletin.

Vulnerability Details

Please consult the security bulletin Security Bulletin: Potential cross-site
scripting vulnerability in the WebSphere Application Server Admin Console
(CVE-2018-1777) for vulnerability details and information about fixes.

Affected Products and Versions

+-----------------------------------------------------------------------+
|Principal Product and Versions     |Affected Supporting Product and    |
|                                   |Versions                           |
|-----------------------------------+-----------------------------------|
|IBM Case Manager 5.1.1             |IBM WebSphere Application Server   |
|IBM Case Manager 5.2.0             |7.0                                |
|IBM Case Manager 5.2.1             |IBM WebSphere Application Server   |
|IBM Case Manager 5.3.0             |8.0                                |
|IBM Case Manager 5.3.1             |IBM WebSphere Application Server   |
|IBM Case Manager 5.3.2             |8.5                                |
|IBM Case Manager 5.3.3             |IBM WebSphere Application Server   |
|                                   |9.0                                |
+-----------------------------------------------------------------------+

Acknowledgement

The vulnerability was reported to IBM by Benoit Ct-Jodoin

Change History

14 Nov, 2018: Original Version Published

- -------------------------------------------------------------------------------

Security Bulletin: A security vulnerability has been identified in IBM
WebSphere Application Server shipped with IBM Case Manager (CVE-2014-7810)

Security Bulletin

Document information
Software version: All Versions
Operating system(s): AIX, Linux, Solaris, Windows
Reference #: 0735791
Modified date: 07 November 2018

Summary

IBM WebSphere Application Server is shipped as a component of IBM Case Manager.
Information about a security vulnerability affecting IBM WebSphere Application
Server has been published in a security bulletin.

Vulnerability Details

Please consult the security bulletin Security Bulletin: Potential bypass
security vulnerability in Expression Language library used by WebSphere
Application Server (CVE-2014-7810) for vulnerability details and information
about fixes.

Affected Products and Versions

+-----------------------------------------------------------------------+
|Principal Product and Versions     |Affected Supporting Product and    |
|                                   |Versions                           |
|-----------------------------------+-----------------------------------|
|IBM Case Manager 5.1.1             |IBM WebSphere Application Server   |
|IBM Case Manager 5.2.0             |7.0                                |
|IBM Case Manager 5.2.1             |IBM WebSphere Application Server   |
|IBM Case Manager 5.3.0             |8.0                                |
|IBM Case Manager 5.3.1             |IBM WebSphere Application Server   |
|IBM Case Manager 5.3.2             |8.5                                |
|IBM Case Manager 5.3.3             |IBM WebSphere Application Server   |
|                                   |9.0                                |
+-----------------------------------------------------------------------+

Change History

14 Nov, 2018: Original Version Published

- --------------------------------------------------------------------------------

Security Bulletin: A security vulnerability has been identified in IBM
WebSphere Application Server shipped with IBM Case Manager (CVE-2018-1770)

Security Bulletin

Document information
Software version: All Versions
Operating system(s): AIX, Linux, Solaris, Windows
Reference #: 0735775
Modified date: 08 November 2018

Summary

IBM WebSphere Application Server is shipped as a component of IBM Case Manager.
Information about a security vulnerability affecting IBM WebSphere Application
Server has been published in a security bulletin.

Vulnerability Details

Please consult the security bulletin Security Bulletin: Potential traversal
vulnerability in IBM WebSphere Application Server Admin Console (CVE-2018-1770)
for vulnerability details and information about fixes.

Affected Products and Versions

+-----------------------------------------------------------------------+
|Principal Product and Versions     |Affected Supporting Product and    |
|                                   |Versions                           |
|-----------------------------------+-----------------------------------|
|IBM Case Manager 5.1.1             |IBM WebSphere Application Server   |
|IBM Case Manager 5.2.0             |7.0                                |
|IBM Case Manager 5.2.1             |IBM WebSphere Application Server   |
|IBM Case Manager 5.3.0             |8.0                                |
|IBM Case Manager 5.3.1             |IBM WebSphere Application Server   |
|IBM Case Manager 5.3.2             |8.5                                |
|IBM Case Manager 5.3.3             |IBM WebSphere Application Server   |
|                                   |9.0                                |
+-----------------------------------------------------------------------+

Acknowledgement

The vulnerability was reported to IBM by Artem Metla

Change History

14 Nov, 2018: Original Version Published

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBW+TdCmaOgq3Tt24GAQgEfw/7BO5YytSUOKgCl3pkRJXLrA0URNzQcnQF
qS+Fra+5WD7Dt6B0jJ2sdRJWMKop+23KkbFAGHmkNGOsWnj5m9vtxH0OR7xV1JxS
4MHGAtOo9HcP0uL6EWc0JxKotGOliqLp9JOtx4nucPnu7RnqVo+J7IYlMx28D1Py
xVClGtH4CC4qDN8ik9kbgGYAMkAnqhLQtG7q1ybTeg1ZHiyHpHowUzD5+NUpwSYk
gStNYVQL0ulIDhuJZl7Sy5cZt1HQOq8fAmtfs01WprBGvUHMO3bsAx4HbB6o5Fuv
x7umMo78H3VJjxuXY2JIxmcPHGrAIb6Rh6gkHj/AQ/ioOqrVRPHI9frRFpFFaE3G
GQQ6MoetRYHxXThU4tTf68Bv9IQrVvcBxm5sxcksjoEL/pkj8vHp3A6GnvqThDGK
DaD5EuwjLV/a9eM2SpcJ5bF82qz7SpwSz1n9HSaev5pqdmTJmRPuOM94n+fQ7ls+
QShHjbpNbyD/plAjtxqNzJjc+KjXpQcQxBs1LJ3ks/iqxiyFqvUfDpYFW4T+4x86
uKhQ5gaOhZlaKlOLe44gp9aKk+EuqEAPxvX9NLj8BWIO0N+FxfXjfZaDj59JKhxL
BhcS8VQWbRL7wSDgsL8yyoocssdfKsqRmup1QWYiPBt69mOrQ7g1IetDHcd4YAfr
omi/hUSlpio=
=mgKH
-----END PGP SIGNATURE-----