Lucene search

K
ibmIBM02C39794B1CE58EEE8C607275FD2B58E5A6893F29970CAF0BE86A2946210B1B7
HistoryJun 25, 2024 - 11:50 a.m.

Security Bulletin: Multiple security vulnerabilities have been identified in IBM WebSphere Application Server shipped with IBM DevOps Code ClearCase (CVE-2024-25026, CVE-2023-50313, CVE-2024-22329)

2024-06-2511:50:47
www.ibm.com
2
ibm
websphere application server
clearcase
security bulletin
vulnerability

6.5 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.5 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.7%

Summary

IBM WebSphere Application Server (WAS) is shipped as a component of IBM DevOps Code ClearCase. Information about security vulnerabilities affecting WAS have been published in security bulletins.

Vulnerability Details

Refer to the security bulletin(s) listed in the Remediation/Fixes section

Affected Products and Versions

Affected Product(s) Version(s)
IBM Rational ClearCase 10.0.0
IBM Rational ClearCase 9.1
IBM DevOps Code ClearCase 11.0

Remediation/Fixes

Refer to the following security bulletin(s) for vulnerability details and information about fixes addressed by IBM WebSphere Application Server (WAS) which is shipped with IBM Rational ClearCase.

Principal Product and Version(s) Affected Supporting Product and Version Affected Supporting Product Security Bulletin
IBM DevOps Code ClearCase 11.0.X

IBM Rational ClearCase, versions 10.0.0.x, 9.1.x| IBM WebSphere Application Server versions 8.5 and 9.0.|

Security Bulletin: IBM WebSphere Application Server and IBM WebSphere Application Server Liberty are vulnerable to server-side request forgery (CVE-2024-22329)

Security Bulletin: IBM WebSphere Application Server could provide weaker than expected security (CVE-2023-50313)

Security Bulletin: IBM WebSphere Application Server and IBM WebSphere Application Server Liberty are vulnerable to a denial of service (CVE-2024-25026)

ClearCase Versions

|

Applying the fix

—|—
11.0.x, 10.0.0.x, 9.1.x|

  1. Determine the WAS version used by your CCRC WAN server. Navigate to the CCRC profile directory (either the profile you specified when installing ClearCase, or <ccase-home>/common/ccrcprofile), then execute the script: bin/versionInfo.sh (UNIX) or bin\versionInfo.bat (Windows). The output includes a section “IBM WebSphere Application Server”. Make note of the version listed in this section. Check your installed version of IBM WebSphere Application Server against this bulletin’s list of vulnerable versions.
  2. Identify the latest available fixes (per the bulletin(s) listed above) for the version of WAS used for CCRC WAN server.
  3. Apply the appropriate WebSphere Application Server fix directly to your CCRC WAN server host. No ClearCase-specific steps are necessary.

For 9.0.2.x and earlier releases, IBM recommends upgrading to a fixed, supported version/release/platform of the product.

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmrational_clearcaseMatchany
CPENameOperatorVersion
ibm rational clearcaseeqany

6.5 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.5 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.7%

Related for 02C39794B1CE58EEE8C607275FD2B58E5A6893F29970CAF0BE86A2946210B1B7