Lucene search

K
ibmIBM1F8B1DCD1B3753CE16C8C06C16CF84D46E9CC0DE4334468A1BD82997E575E5D7
HistoryNov 03, 2022 - 5:10 p.m.

Security Bulletin: IBM App Connect Enterprise Certified Container IntegrationServer operands that use the postgresql connector code may be vulnerable to SQL Injection due to [CVE-2022-35942]

2022-11-0317:10:50
www.ibm.com
12

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

54.6%

Summary

The postgresql Loopback connector is available in the IntegrationServer image from IBM App Connect Enterprise Certified Container. IBM App Connect Enterprise Certified Container does not use this component directly but it is available for use by an application developed to run in an IntegrationServer container. IntegrationServer operands that use the postgresql connector code may be vulnerable to SQL Injection. This bulletin provides patch information to address the reported vulnerability [CVE-2022-35942] in loopback-connector-postgresql.

Vulnerability Details

CVEID:CVE-2022-35942
**DESCRIPTION:**Loopback loopback-connector-postgresql is vulnerable to SQL injection. A local attacker could send specially-crafted SQL statements using the ‘contains’ parameter, which could allow the attacker to view, add, modify or delete information in the back-end database.
CVSS Base score: 9.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/233609 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
App Connect Enterprise Certified Container 4.1
App Connect Enterprise Certified Container 4.2
App Connect Enterprise Certified Container 5.0
App Connect Enterprise Certified Container 5.1

Remediation/Fixes

IBM strongly suggests the following:

App Connect Enterprise Certified Container 4.1, 4.2, 5.0 and 5.1 (Continuous Delivery)

Upgrade to App Connect Enterprise Certified Container Operator version 5.2.0 or higher, and ensure that all DesignerAuthoring and IntegrationServer components are at 12.0.5.0-r3 or higher. Documentation on the upgrade process is available at <https://www.ibm.com/docs/en/app-connect/containers_cd?topic=releases-upgrading-operator&gt;

App Connect Enterprise Certified Container 5.0 LTS (Long Term Support)

Upgrade to App Connect Enterprise Certified Container Operator version 5.0.1 or higher, and ensure that all DesignerAuthoring and IntegrationServer components are at 12.0.6.0-r1-lts or higher. Documentation on the upgrade process is available at <https://www.ibm.com/docs/en/app-connect-contlts?topic=releases-upgrading-operator&gt;

Workarounds and Mitigations

None

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

54.6%

Related for 1F8B1DCD1B3753CE16C8C06C16CF84D46E9CC0DE4334468A1BD82997E575E5D7