Lucene search

K
ibmIBM0DE3A792FAD190B8655979FB1A21DC1E0CA059ED9214541E3BEA65B864F0D32D
HistoryMar 05, 2020 - 11:02 a.m.

Security Bulletin: Rational Integration Tester HTTP/TCP Proxy component in Rational Test Virtualization Server and Rational Test Workbench affected by Netty vulnerabilities (CVE-2020-7238, CVE-2019-16869, CVE-2019-20445, CVE-2019-20444)

2020-03-0511:02:07
www.ibm.com
17

0.012 Low

EPSS

Percentile

85.6%

Summary

Netty is vulnerable to security issues affecting the Rational Integration Tester HTTP/TCP Proxy component in Rational Test Virtualization Server and Rational Test Workbench

Vulnerability Details

CVEID:CVE-2020-7238
**DESCRIPTION:**Netty is vulnerable to HTTP request smuggling, caused by a flaw when handling Transfer-Encoding whitespace and a later Content-Length header. By sending a specially-crafted request, an attacker could exploit this vulnerability to poison the web cache, bypass web application firewall protection, and conduct XSS attacks.
CVSS Base score: 6.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/175398 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)

CVEID:CVE-2019-16869
**DESCRIPTION:**Netty is vulnerable to HTTP request smuggling, caused by a flaw when handling unusual whitespaces before the colon in HTTP headers. By sending a specially-crafted request, an attacker could exploit this vulnerability to poison the web cache, bypass web application firewall protection, and conduct XSS attacks.
CVSS Base score: 6.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/167672 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)

CVEID:CVE-2019-20445
**DESCRIPTION:**Netty could provide weaker than expected security, caused by non-proper handling of Content-Length and Transfer-Encoding in the HttpObjectDecoder.java. A remote attacker could exploit this vulnerability to launch further attacks on the system.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/175486 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)

CVEID:CVE-2019-20444
**DESCRIPTION:**Netty is vulnerable to HTTP request smuggling, caused by a flaw in the HttpObjectDecoder.java. By sending a specially-crafted request, an attacker could exploit this vulnerability to poison the web cache, bypass web application firewall protection, and conduct XSS attacks.
CVSS Base score: 6.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/175487 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)

Affected Products and Versions

Affected Product(s) Version(s)
HTTP/TCP Proxy component in Rational Test Virtualization Server 8.7.1.2, 9.0.1.1, 9.1.1.1, 9.2.1.1, 9.5.0, 10.0.2.0
HTTP/TCP Proxy component in Rational Test Workbench 8.7.1.2, 9.0.1.1, 9.1.1.1, 9.2.1.1, 9.5.0, 10.0.2.0

All versions prior to those shown are affected. Upgrade to the latest versions shown.

Remediation/Fixes

Upgrade your installation by following the instructions below:

  1. Verify the version of Rational Test Control Panel
  2. Download the fix for your product from Fix Central, this can be obtained for either Rational Test Workbench or Rational Test Virtualization Server by selecting the product and relevant version before browsing for fixes. Select and download the 20200302-ifix for your selected product.
  3. Stop the HTTP/TCP proxy.
  4. Navigate to the existing Rational Test Control Panel installation
    The default installation locations for these files are:
    Windows: C:\Program Files\IBM\RationalTestControlPanel\ AIX, Linux, Solaris: /opt/IBM/RationalTestControlPanel/
  5. Copy the contents of the “httptcp” directory as a backup.
  6. Unzip the download fix into the RationalTestControlPanel directory, overwriting the existing files.
  7. Start the HTTP/TCP proxy.

Workarounds and Mitigations

None

0.012 Low

EPSS

Percentile

85.6%