Lucene search

K
ibmIBM0BFFC8DA3D20D61485D3B937CF8B08468DB94C6B523B29DE9871511B28C3EEAE
HistorySep 08, 2022 - 12:26 a.m.

Security Bulletin: Potential Security Vulnerabilities fixed in IBM WebSphere Application Server 8.5.5.4

2022-09-0800:26:26
www.ibm.com
21

3.4 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.975 High

EPSS

Percentile

100.0%

Summary

Cross reference list for security vulnerabilites fixed in IBM WebSphere Application Server Full Profile and Liberty Profile 8.5.5.4, IBM WebSphere Application Server Hypervisor 8.5.5.4 and IBM HTTP Server 8.5.5.4.

Vulnerability Details

CVE ID:CVE-2014-3021(APAR PI08268) **

DESCRIPTION: ** IBM WebSphere Application Server could allow a remote attacker to obtain sensitive information caused by a vulnerability in HTTP headers used by Web Applications. An attacker could exploit this vulnerability using a specially crafted HTTP method to access cookie and authentication data, which could be used to launch further attacks on the system.**

CVSS:** _
CVSS Base Score: 5.0
CVSS Temporal Score: See _https://exchange.xforce.ibmcloud.com/vulnerabilities/93059 for the current score
CVSS Environmental Score*: Undefined
CVSS String: (AV:N/AC:L/Au:N/C:P/I:N/A:N)
**

AFFECTED VERSIONS**: The following IBM WebSphere Application Server Versions are affected:

  • Version 8.5 Full Profile and Liberty Profile
  • Version 8
  • Version 7

**
Remediation/Fixes: **The recommended solution is to apply the Fix Pack or PTF for each named product as soon as practical. _
Fix:_

Apply an Interim Fix, Fix Pack or PTF containing this APAR PI08268, as noted below: **

For IBM WebSphere Application Server

For V8.5.0.0 through 8.5.5.3:**

  • Apply Fix Pack 4 (8.5.5.4), or later.

**
For V8.0.0.0 through 8.0.0.9:**

  • Apply Fix Pack 10 (8.0.0.10), or later.

**
For V7.0.0.0 through 7.0.0.33:**

  • Apply Fix Pack 35 (7.0.0.35), or later.

_
Workaround(s):None known
Mitigation(s):_
None known

CVE IDs:CVE-2014-0226CVE-2014-0231CVE-2014-0118****CVE-2013-5704** (APAR PI22070)

Affected Versions/Remediation/Fixes/Workaround/Mitigation**
Please refer to IBM HTTP Server Security bulletin for multiple vulnerabilities for remediation information.

**** **CVE IDs: **CVE-2014-4770**and CVE-2014-4816 (APAR PI23055) **
**DESCRIPTION:**IBM WebSphere Application Server Admin Console is vulnerable to cross-site scripting and cross-site request forgery.

Affected Versions/Remediation/Fixes/Workaround/Mitigation
Please refer to _WebSphere Application Server Security bulletin for CVE-2014-4770 and CVE-2014-4816 _ for remediation information.

CVE ID:CVE-2014-6164(APAR PI23430) **

DESCRIPTION: WebSphere Application Server could allow a remote attacker to spoof OpenID and OpenID connect cookies. A remote attacker could create a specially-crafted URL, which once clicked by the victim, could provide the attacker with sensitive information.

CVSS:** _
CVSS Base Score: 4.3
CVSS Temporal Score: See __<https://exchange.xforce.ibmcloud.com/vulnerabilities/97713&gt;_ for the current score
CVSS Environmental Score*: Undefined
CVSS String: (AV:N/AC:M/Au:N/C:N/I:P/A:N)
**

AFFECTED VERSIONS**: The following IBM WebSphere Application Server Versions are affected:

  • Version 8.5 Full Profile

**
Remediation/Fixes: **The recommended solution is to apply the Fix Pack or PTF for each named product as soon as practical. _
Fix:_

Apply an Interim Fix, Fix Pack or PTF containing this APAR PI23430, as noted below: **

For IBM WebSphere Application Server

For V8.5.0.0 through 8.5.5.3:**

  • Apply Fix Pack 4 (8.5.5.4), or later.

** Workaround(s): None known_
Mitigation(s):_** None known

CVE ID:CVE-2014-6167(APAR PI23819) **

DESCRIPTION: IBM WebSphere Application Server may be vulnerable to cross-site scripting, caused by improper validation of session input using URL rewriting. A remote attacker could exploit this vulnerability in a specially-crafted URL to execute script in a victim’s Web browser within the security context of the hosting Web site, once the URL is clicked.

CVSS:** _
CVSS Base Score: 4.3
CVSS Temporal Score: See _https://exchange.xforce.ibmcloud.com/vulnerabilities/97748 for the current score
CVSS Environmental Score*: Undefined
CVSS String: (AV:N/AC:M/Au:N/C:N/I:P/A:N)
**

AFFECTED VERSIONS**: The following IBM WebSphere Application Server Versions are affected:

  • Version 8.5 Full Profile and Liberty Profile
  • Version 8
  • Version 7

**
Remediation/Fixes: **The recommended solution is to apply the Fix Pack or PTF for each named product as soon as practical. _
Fix:_

Apply an Interim Fix, Fix Pack or PTF containing this APAR PI23819, as noted below: **

For IBM WebSphere Application Server

For V8.5.0.0 through 8.5.5.3:**

  • Apply Fix Pack 4 (8.5.5.4), or later.

**
For V8.0.0.0 through 8.0.0.9:**

  • Apply Fix Pack 10 (8.0.0.10), or later.

For V7.0.0.0 through 7.0.0.35:* Apply Fix Pack 37 (7.0.0.37), or later.** **

Workaround(s): None known**_
Mitigation(s):_** None known

CVE ID:CVE-2014-6166**(APAR PI25310 and PI28632)****

DESCRIPTION: ** WebSphere Application Server Communications Enabled Applications (CEA) Service could allow a remote attacker to obtain sensitive information, caused by an XML External Entity Injection (XXE) error when processing XML data. By sending specially-crafted XML data, an attacker could exploit this vulnerability to obtain sensitive information. This only occurs if CEA is enabled. By default this is disabled.**

CVSS:** _
CVSS Base Score: 5.0
CVSS Temporal Score: See _https://exchange.xforce.ibmcloud.com/vulnerabilities/97746 for the current score
CVSS Environmental Score*: Undefined
CVSS String: (AV:N/AC:L/Au:N/C:P/I:N/A:N)
**

AFFECTED VERSIONS**: The following IBM WebSphere Application Server Versions are affected:

  • Version 8.5 Full Profile
  • Version 8
  • Feature Pack for Communications Enabled Applications

**
Remediation/Fixes: **The recommended solution is to apply the Fix Pack or PTF for each named product as soon as practical. _
Fix:_

Apply an Interim Fix, Fix Pack or PTF containing this APAR PI25310, as noted below: **

For IBM WebSphere Application Server

For V8.5.0.0 through 8.5.5.3:**

  • Apply Fix Pack 4 (8.5.5.4), or later.

-- OR

**
For V8.0.0.0 through 8.0.0.9:**

  • Apply Fix Pack 10 (8.0.0.10), or later.

-- OR

**For IBM WebSphere Application Server Feature Pack for Communications Enabled Applications (CEA)

For V1.0.0.0 through 1.0.0.13:*** Apply Interim Fix****PI28632

-- OR

  • Apply Fix Pack 15 (1.0.0.15), or later.** **

Workaround(s): None known**_
Mitigation(s):_** None known

CVE ID:CVE-2014-6174(APAR PI27152) **

DESCRIPTION: IBM WebSphere Application Server Administrative Console could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could send a specially-crafted HTTP request to hijack the victim’s click actions or launch other client-side browser attacks.

CVSS:** _
CVSS Base Score: 4.3
CVSS Temporal Score: See _https://exchange.xforce.ibmcloud.com/vulnerabilities/98486 for the current score
CVSS Environmental Score*: Undefined
CVSS String: (AV:N/AC:M/Au:N/C:N/I:P/A:N)
**

AFFECTED VERSIONS**: The following IBM WebSphere Application Server Versions are affected:

  • Version 8.5 Full Profile
  • Version 8
  • Version 7

**
Remediation/Fixes: The recommended solution is to apply the Fix Pack or PTF for each named product as soon as practical._

Fix:_**
Apply an Interim Fix, Fix Pack or PTF containing this APAR PI27152, as noted below: **

For IBM WebSphere Application Server

For V8.5.0.0 through 8.5.5.3:**

-- OR

  • Apply Fix Pack 4 (8.5.5.4), or later.

**
For V8.0.0.0 through 8.0.0.9:**

-- OR

  • Apply Fix Pack 10 (8.0.0.10), or later.

**
For V7.0.0.0 through 7.0.0.35:**

-- OR

  • Apply Fix Pack 37 (7.0.0.37), or later.

_
Workaround(s):None known
Mitigation(s):_
None known

CVE ID:CVE-2014-8890(APAR PI29911) **

DESCRIPTION: ** IBM WebSphere Application Server for Liberty could allow a remote attacker to gain elevated privileges on the system if the deployment descriptor security constraints are combined with ServletSecurity annotations on a servlet.

CVSS: _
CVSS Base Score: 5.1__
CVSS Temporal Score: See _https://exchange.xforce.ibmcloud.com/vulnerabilities/99009 for the current score
CVSS Environmental Score*: Undefined
CVSS String: (AV:N/AC:H/Au:N/C:P/I:P/A:P)
**

AFFECTED VERSIONS**: The following IBM WebSphere Application Server Versions are affected:

  • Version 8.5 Liberty Profile

**
Remediation/Fixes: **The recommended solution is to apply the Fix Pack or PTF for each named product as soon as practical. _
Fix:_

Apply an Interim Fix, Fix Pack or PTF containing this APAR PI29911, as noted below: **

For IBM WebSphere Application Server
** For V8.5.0.0 through 8.5.5.3:

  • Apply Fix Pack 4 (8.5.5.4), or later.

-- OR

Workaround(s): If your servlet has constraints in both the annotation and the Deployment Descriptor, combine them to be in the web.xml**_
Mitigation(s):_** None known

CVE ID: CVE-2014-3566** **
**DESCRIPTION:**IBM WebSphere Application could allow a remote attacker to obtain sensitive information, caused by a design error when using the SSLv3 protocol. A remote user with the ability to conduct a man-in-the-middle attack could exploit this vulnerability via a POODLE (Padding Oracle On Downgraded Legacy Encryption) attack to decrypt SSL sessions and access the plaintext of encrypted connections.

Please refer to the Security Bulletin for IBM HTTP Server to remediate your webserver.
Please refer to the Security Bulletin for IBM WebSphere Application Server to remediate your Application Server. ** **
**IBM SDK:**Please refer to this security bulletin for SDK fixes that were shipped with WebSphere Application Server Version 8.5.5.4_
_http://www-01.ibm.com/support/docview.wss?uid=swg21687740

**Important Note for SIP Applications:**You may need to Recompile SIP applications migrated from WebSphere Application Server 7.0 or below to WebSphere Application Server 7.0 with CEA feature pack or WebSphere Application Server 8.0 and above. This is not due to a vulnerability issue. Please refer to SIP application Technote for more information.

3.4 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.975 High

EPSS

Percentile

100.0%