Lucene search

K
ibmIBM18A909E8B89F9F80561CCF39269DFE39D3BA1E9C174CAC7AE6D059BC13701307
HistorySep 25, 2022 - 11:13 p.m.

Security Bulletin: Some IBM Sterling Order Management APIs may return database sensitive information (CVE-2013-0578)

2022-09-2523:13:40
www.ibm.com
9
ibm sterling order management
api tester
cve-2013-0578
admin users
fix
vulnerability

3.5 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:N/A:N

5.7 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

45.5%

Abstract

Some IBM Sterling Order Management APIs may return database sensitive information when API tester is deployed in the environment.

Content

VULNERABILITY DETAILS:

DESCRIPTION:
Some IBM Sterling Order Management APIs can return database sensitive user information when used in API tester. All these are administrative APIs and are normally accessible only to admin users through the User Interface. However, if API tester is deployed in an environment, then these APIs can be invoked by users having access to the API tester URL. API tester is disabled by default. While the API tester can be enabled, we strongly recommend the API tester remain disabled in the production environment.

CVE ID:CVE-2013-0578
CVSS Base Score: 3.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/83330 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:S/C:P/I:N/A:N)

AFFECTED PRODUCTS AND VERSIONS:
IBM Sterling Selling and Fulfillment Foundation 9.2.0
IBM Sterling Selling and Fulfillment Foundation 9.1.0
IBM Sterling Selling and Fulfillment Foundation 9.0
IBM Sterling Selling and Fulfillment Foundation 8.5
IBM Sterling Multi-Channel Fulfillment Solution 8.0

REMEDIATION:

The recommended solution is to apply the fix as soon as practical. Please see below for information about the available fixes.

_Fix_* VRMF APAR How to acquire fix
9.2.0-FP17 9.2.0.17
_<http://www-933.ibm.com/support/fixcentral/options&gt;_

Select appropriate VRMF ie., 9.2.0.17 to access the FixPack 9.1.0-FP45|9.1.0.45|
| _<http://www-933.ibm.com/support/fixcentral/options&gt;_

Select appropriate VRMF ie., 9.1.0.45 to access the FixPack 9.0-HF73|9.0.0.73|
| https://www14.software.ibm.com/webapp/iwm/web/reg/signup.do?source=swg-SterlngLegacyreq&lang=en_US 8.5-HF93|8.5.0.93|IC91829|https://www14.software.ibm.com/webapp/iwm/web/reg/signup.do?source=swg-SterlngLegacyreq&lang=en_US 8.0-HF128|8.0.0128|
| https://www14.software.ibm.com/webapp/iwm/web/reg/signup.do?source=swg-SterlngLegacyreq&lang=en_US

Workaround(s):
Disable API tester until fix is applied.

Mitigation(s):
Disable API test in production environment.

REFERENCES:
ยท Complete CVSS Guide
ยท On-line Calculator V2_ _
ยท CVE-2013-057____8
ยท _X-Force Vulnerability Database: _https://exchange.xforce.ibmcloud.com/vulnerabilities/83330

RELATED INFORMATION:
_IBM Secure Engineering Web Portal _
IBM Product Security Incident Response Blog

_*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash. _

_Note: _According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an โ€œindustry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.โ€ IBM PROVIDES THE CVSS SCORES โ€œAS ISโ€ WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

[{โ€œProductโ€:{โ€œcodeโ€:โ€œSS6PEWโ€,โ€œlabelโ€:โ€œIBM Sterling Order Managementโ€},โ€œBusiness Unitโ€:{โ€œcodeโ€:โ€œBU048โ€,โ€œlabelโ€:โ€œIBM Softwareโ€},โ€œComponentโ€:โ€œMaintenanceโ€,โ€œPlatformโ€:[{โ€œcodeโ€:โ€œPF002โ€,โ€œlabelโ€:โ€œAIXโ€},{โ€œcodeโ€:โ€œPF010โ€,โ€œlabelโ€:โ€œHP-UXโ€},{โ€œcodeโ€:โ€œPF016โ€,โ€œlabelโ€:โ€œLinuxโ€},{โ€œcodeโ€:โ€œPF027โ€,โ€œlabelโ€:โ€œSolarisโ€},{โ€œcodeโ€:โ€œPF033โ€,โ€œlabelโ€:โ€œWindowsโ€}],โ€œVersionโ€:โ€œ9.2;9.1;9.0;8.5;8.0โ€,โ€œEditionโ€:โ€œAll Editionsโ€,โ€œLine of Businessโ€:{โ€œcodeโ€:โ€œLOB59โ€,โ€œlabelโ€:โ€œSustainability Softwareโ€}}]

Affected configurations

Vulners
Node
ibmsterling_order_managementMatch9.2
OR
ibmsterling_order_managementMatch9.1
OR
ibmsterling_order_managementMatch9.0
OR
ibmsterling_order_managementMatch8.5
OR
ibmsterling_order_managementMatch8.0

3.5 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:N/A:N

5.7 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

45.5%

Related for 18A909E8B89F9F80561CCF39269DFE39D3BA1E9C174CAC7AE6D059BC13701307