-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.1834
           Security Bulletin: Vulnerabilities in Swagger affects
                   WebSphere Application Server Liberty
                                22 May 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           WebSphere Application Server Liberty
Publisher:         IBM
Operating System:  Linux variants
Impact/Access:     Access Confidential Data -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-17495  

Reference:         ESB-2020.1019
                   ESB-2020.0268

Original Bulletin: 
   https://www.ibm.com/support/pages/node/6207084

- --------------------------BEGIN INCLUDED TEXT--------------------

Vulnerabilities in Swagger affects WebSphere Application Server Liberty

Security Bulletin

Summary

There are vulnerabilities in Swagger that affects WebSphere Application Server
Liberty used by IBM Streams. IBM Streams has addressed the applicable CVEs.

Vulnerability Details

CVEID: CVE-2019-17495
DESCRIPTION: Swagger UI could allow a remote attacker to obtain sensitive
information, caused by a CSS injection flaw. By using the relative path
overwrite (RPO) attack technique, an attacker could exploit this vulnerability
to obtain sensitive information.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169050 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

Affected Products and Versions

+--------------------+----------+
|Affected Product(s) |Version(s)|
+--------------------+----------+
|InfoSphere Streams  |4.1.1.x   |
+--------------------+----------+
|InfoSphere Streams  |4.2.1.x   |
+--------------------+----------+
|InfoSphere Streams  |4.3.1.x   |
+--------------------+----------+

Remediation/Fixes

NOTE:Fix Packs are available on IBM Fix Central.

To remediate/fix this issue, follow the instructions below:

Version 4.3.x: Apply 4.3.0 Fix Pack 1 (4.3.1.2) or higher .
Version 4.2.x: Apply 4.2.1 Fix Pack 4 (4.2.1.10) or higher .
Version 4.1.x: Apply 4.1.1 Fix Pack 6 (4.1.1.12) or higher .
Versions 4.0.x,3.2.x, 3.1.x, and 3.0.x: For versions earlier than 4.x.x, IBM
recommends upgrading to a fixed, supported version/release/platform of the
product. Customers who cannot upgrade and need to secure their installation
should open a PMR with IBM Technical Support and request assistance securing
their InfoSphere Streams system against the vulnerabilities identified in this
Security Bulletin.

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=UI05
-----END PGP SIGNATURE-----