Operating System:

[Linux]

Published:

30 January 2020

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.0344
    Security Bulletin: A Security Vulnerability Has Been Identified In
         WebSphere Application Server ND shipped with IBM Security
                     Identity Manager (CVE-2019-4505)
                              30 January 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Security Identity Manager
Publisher:         IBM
Operating System:  Linux variants
Impact/Access:     Access Confidential Data -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-4505  

Reference:         ESB-2019.4787
                   ESB-2019.4596
                   ESB-2019.4238
                   ESB-2019.3977

Original Bulletin: 
   https://www.ibm.com/support/pages/node/1284028

- --------------------------BEGIN INCLUDED TEXT--------------------

A Security Vulnerability Has Been Identified In  WebSphere Application Server
ND shipped with IBM Security Identity Manager (CVE-2019-4505)

Security Bulletin

Summary

WebSphere Application Server ND is shipped with IBM Security Identity Manager.
Information about a security vulnerability affecting WebSphere Application
Server ND has been published in a security bulletin.

Vulnerability Details

CVEID: CVE-2019-4505
DESCRIPTION: IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 Network
Deployment could allow a remote attacker to obtain sensitive information,
caused by sending a specially-crafted URL. This can lead the attacker to view
any file in a certain directory. IBM X-Force ID: 164364.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
164364 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)

Affected Products and Versions

+--------------------+----------+
|Affected Product(s) |Version(s)|
+--------------------+----------+
|ISIM                |6.0.0     |
+--------------------+----------+
|ISIM (SS)           |6.0.0.24  |
+--------------------+----------+

Remediation/Fixes

+-----------------------------+-----------------------------+-------------------------+
|Principal Product and Version|Affected Supporting Product  |Affected Supporting      |
|(s)                          |and Version                  |Product Security Bulletin|
+-----------------------------+-----------------------------+-------------------------+
|IBM Security Identity Manager|WebSphere Application Server |Information disclosure in|
|6.0. 6.0.0.24                |ND 7.0                       |WebSphere Application    |
|                             |                             |Server ND (CVE-2019-4505)|
+-----------------------------+-----------------------------+-------------------------+

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=PwDl
-----END PGP SIGNATURE-----