-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.0322
Security vulnerabilities have been identified in IBM WebSphere Application
        Server Liberty shipped with IBM Digital Business Automation
                         Workflow family products
                              29 January 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Digital Business Automation Workflow family products
                   IBM WebSphere Application Server Liberty
Publisher:         IBM
Operating System:  Windows
                   AIX
                   Linux variants
                   IBM i
                   z/OS
                   Solaris
                   HP-UX
                   Mac OS
                   Apple iOS
Impact/Access:     Cross-site Scripting     -- Remote with User Interaction
                   Access Confidential Data -- Existing Account            
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-17495 CVE-2019-4663 

Reference:         ESB-2020.0268
                   ESB-2020.0258
                   ESB-2019.4665
                   ESB-2019.4596

Original Bulletin: 
   https://www.ibm.com/support/pages/node/1284274
   https://www.ibm.com/support/pages/node/1274596
   https://www.ibm.com/support/pages/node/1284280
   https://www.ibm.com/support/pages/node/1127367

Comment: This bulletin contains four (4) IBM security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: A security vulnerability has been identified in IBM
WebSphere Application Server Liberty shipped with IBM Digital Business
Automation Workflow family products (CVE-2019-17495)

Document Information

Product            : IBM Business Process Manager Advanced
Software version   : 8.6, 8.5.7.CF201706, 8.5.7.CF201703, 8.5.7.CF201612, 8.5.7.CF201609, 8.5.7.CF201606, 8.5.7, 8.5.6.2, 8.5.6.1, 8.5.6, 8.5.5, 8.5.0.2, 8.5.0.1, 8.5, 8.0.1.3, 8.0.1.2, 8.0.1.1, 8.0.1, 8.0
Operating system(s): Platform Independent

Summary

WebSphere Application Server Liberty is shipped as a component of IBM Business
Automation Workflow and IBM Business Process Manager Process Federation Server
(since 8.5.6) and User Management Service (since 18.0.0.1). Information about
a security vulnerability affecting IBM WebSphere Application Server Liberty
have been published in a security bulletin.

Vulnerability Details

Refer to the security bulletins(s) listed in the Remediation/Fixes section

Affected Products and Versions

+--------------------------------+----------+
|Affected Product(s)             |Version(s)|
+--------------------------------+----------+
|IBM Business Automation Workflow|V19.0     |
|                                |V18.0     |
+--------------------------------+----------+
|                                |V8.6      |
|IBM Business Process Manager    |V8.5      |
|                                |V8.0      |
+--------------------------------+----------+

Remediation/Fixes

Please consult the security bulletin: Swagger vulnerability affects WebSphere
Application Server Liberty (CVE-2019-17495) for vulnerability details and
information about fixes.

Workarounds and Mitigations

None

Change History

28 Jan 2020: Initial Publication

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Document Location

Worldwide


- --------------------------------------------------------------------------------


Security Bulletin: Swagger vulnerability affects WebSphere Application Server
Liberty (CVE-2019-17495)

Document Information

Product            : WebSphere Application Server
Component          : Liberty
Software version   : all
Operating system(s): AIX
                     IBM i
                     Linux
                     Windows
                     z/OS

Summary

There is a Swagger vulnerability that affects WebSphere Application Server
Liberty. This affects the mpOpen-1.x and openAPI-3.x features. This
vulnerability has been addressed.

Vulnerability Details

CVEID: CVE-2019-17495
DESCRIPTION: Swagger UI could allow a remote attacker to obtain sensitive
information, caused by a CSS injection flaw. By using the relative path
overwrite (RPO) attack technique, an attacker could exploit this vulnerability
to obtain sensitive information.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities
/169050 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

Affected Products and Versions

+------------------------------------+--------------------+
|Affected Product(s)                 |Version(s)          |
+------------------------------------+--------------------+
|WebSphere Application Server Liberty|17.0.0.3 - 19.0.0.12|
+------------------------------------+--------------------+

Remediation/Fixes

The recommended solution is to apply the interim fix, Fix Pack or PTF
containing the APAR for each named product as soon as practical.

For WebSphere Application Server Liberty using mpOpenAPI-1.0, mpOpenAPI-1.1,
openAPI-3.0 or openAPI-3.1 features:

 Upgrade to minimal fix pack levels as required by interim fix and then apply
Interim Fix PH20161
- --OR--
 Apply Fix Pack 20.0.0.1 or later (targeted availability 1Q2020).

Additional interim fixes may be available and linked off the interim fix
download page.

Workarounds and Mitigations

None

Change History

20 January 2020: Initial Publication

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Document Location

Worldwide


- --------------------------------------------------------------------------------


Security Bulletin: A security vulnerability has been identified in IBM
WebSphere Application Server Liberty shipped with IBM Digital Business
Automation Workflow family products (CVE-2019-4663)

Document Information

Product            : IBM Business Process Manager Advanced
Component          : Component independent
Software version   : 8.6, 8.5.7.CF201706, 8.5.7.CF201703, 8.5.7.CF201612, 8.5.7.CF201609, 8.5.7.CF201606, 8.5.7, 8.5.6.2, 8.5.6.1, 8.5.6, 8.5.5, 8.5.0.2, 8.5.0.1, 8.5, 8.0.1.3, 8.0.1.2, 8.0.1.1, 8.0.1, 8.0
Operating system(s): Platform Independent
Edition            : Any edition

Summary

WebSphere Application Server Liberty is shipped as a component of IBM Business
Automation Workflow and IBM Business Process Manager Process Federation Server
(since 8.5.6) and User Management Service (since 18.0.0.1). Information about
a security vulnerability affecting IBM WebSphere Application Server Liberty
have been published in a security bulletin.

Vulnerability Details

Refer to the security bulletins(s) listed in the Remediation/Fixes section

Affected Products and Versions

+--------------------------------+----------+
|Affected Product(s)             |Version(s)|
+--------------------------------+----------+
|IBM Business Automation Workflow|V19.0     |
|                                |V18.0     |
+--------------------------------+----------+
|                                |8.6       |
|IBM Business Process Manager    |8.5       |
|                                |8.0       |
+--------------------------------+----------+

Note that Cumulative Fixes cannot automatically install interim fixes for the
base Application Server. It is important to follow the complete installation
instructions and manually ensure that recommended security fixes are
installed.

For earlier and unsupported versions of the products, IBM recommends upgrading
to a fixed, supported version of the product.

Remediation/Fixes

Please consult the security bulletin: WebSphere Application Server Liberty is
vulnerable to Cross-site Scripting (CVE-2019-4663) for vulnerability details
and information about fixes.

Workarounds and Mitigations

None

Change History

28 Jan 2020: Initial Publication

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Document Location

Worldwide


- --------------------------------------------------------------------------------


Security Bulletin: WebSphere Application Server Liberty is vulnerable to
Cross-site Scripting (CVE-2019-4663)

Document Information

Product            : WebSphere Application Server
Component          : admin center
Software version   : Liberty
Operating system(s): AIX
                     HP-UX
                     IBM i
                     Linux
                     Solaris
                     Windows
                     Mac OS
                     iOS
Edition            : liberty

Summary

There is a cross-site scripting vulnerability in the Admin Center. This has
been addressed.

Vulnerability Details

CVEID: CVE-2019-4663
DESCRIPTION: IBM WebSphere Application Server - Liberty is vulnerable to
cross-site scripting. This vulnerability allows users to embed arbitrary
JavaScript code in the Web UI thus altering the intended functionality
potentially leading to credentials disclosure within a trusted session.
CVSS Base score: 5.4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities
/171245 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)

Affected Products and Versions

+------------------------------------+--------------------+
|Affected Product(s)                 |Version(s)          |
+------------------------------------+--------------------+
|WebSphere Application Server Liberty|17.0.0.3 - 19.0.0.11|
+------------------------------------+--------------------+

Remediation/Fixes

For WebSphere Application Server Liberty using adminCenter-1.0[]:

 Upgrade to minimal fix pack levels as required by interim fix and then apply
Interim Fix PH18799
- --OR--
 Apply Fix Pack 19.0.0.12 or later (targeted availability 4Q2019).

Workarounds and Mitigations

None

Change History

09 December 2019: Initial Publication

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Document Location

Worldwide

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=R2Ly
-----END PGP SIGNATURE-----