Lucene search

K
ibmIBM1F65F36890B66B5373E3D7320F6B3DD922568BE3BA14F786BB3361B8F05C9976
HistorySep 25, 2022 - 8:45 p.m.

Security Bulletin: CSRF vulnerability in IBM Infosphere Guardium (CVE-2012-3309)

2022-09-2520:45:36
www.ibm.com
13
cross site request forgery
ibm infosphere guardium
cve-2012-3309
cvss
account creation panel
csrf filtering
version 8.2
vulnerability mitigation
positive technologies
security bulletin
customer environment specific
linux

0.002 Low

EPSS

Percentile

55.4%

Abstract

Security Bulletin: CSRF vulnerability in IBM Infosphere Guardium (CVE-2012-3309)

Content

**SUMMARY: **Account creation panel is susceptible to cross site request forgery.

VULNERABILITY DETAILS:

CVE ID: CVE-2012-3309

DESCRIPTION:

Account creation panel is susceptible to cross site request forgery allowing for an attacker to create an administrative account.

CVSS:
CVSS Base Score: 6.8
CVSS Temporal Score: unavailable
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:P)

AFFECTED PLATFORMS:

IBM Infosphere Guardium 8.2 and earlier

REMEDIATION:

Using version 8.2 with CSRF filtering enabled, prevents this exploit. Versions 8.0 and 8.01 are not capable of CSRF filtering. As such, users are encouraged to update to 8.2.
See the version 8.2 release notes for information on enabling CSRF protection.

To confirm the CSRF is enabled in version 8.2, run following command in CLI:
show gui csrf_status

If the result is β€œDisabled” then execute the following command to enable CSRF filtering:
store gui csrf_status on

Workaround:
If using version 8.2 - enable CSRF filtering as described above

Mitigation:
Avoid using your web browser to open other web sites when accessing the Guardium administration console.

REFERENCES:
Β· On-line Calculator V2
Β· X-Force Vulnerability Database
Β· CVE-2012-3309

RELATED INFORMATION:
Β· IBM Secure Engineering Web Portal
Β· IBM Product Security Incident Response Blog** **

ACKNOWLEDGEMENT:
The vulnerability was reported to IBM by Positive Technologies discovered by Positive Research Center (reference number PT-2012-15).

_*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash. _

_
Note: _
According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an β€œindustry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.” IBM PROVIDES THE CVSS SCORES β€œAS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS _
Note:_
_ IBM’s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM’s sole discretion. Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion_

[{β€œProduct”:{β€œcode”:β€œSSMPHH”,β€œlabel”:β€œIBM Security Guardium”},β€œBusiness Unit”:{β€œcode”:β€œBU059”,β€œlabel”:β€œIBM Software w/o TPS”},β€œComponent”:β€œβ€“β€,β€œPlatform”:[{β€œcode”:β€œPF016”,β€œlabel”:β€œLinux”}],β€œVersion”:β€œ8.2;8.0.1;8.0”,β€œEdition”:β€œβ€,β€œLine of Business”:{β€œcode”:β€œLOB24”,β€œlabel”:β€œSecurity Software”}}]

0.002 Low

EPSS

Percentile

55.4%

Related for 1F65F36890B66B5373E3D7320F6B3DD922568BE3BA14F786BB3361B8F05C9976