logo
DATABASE RESOURCES PRICING ABOUT US

Security Bulletin: There is an information disclosure vulnerability in Liberty for Java (CVE-2020-4329)

Description

## Summary There is an information disclosure in WebSphere Application Server Liberty. ## Vulnerability Details ** CVEID: **[CVE-2020-4329](<https://vulners.com/cve/CVE-2020-4329>) ** DESCRIPTION: **IBM WebSphere Application Server 7.0, 8.0, 8.5, 9.0 and Liberty 17.0.0.3 through 20.0.0.4 could allow a remote, authenticated attacker to obtain sensitive information, caused by improper parameter checking. This could be exploited to conduct spoofing attacks. IBM X-Force ID: 177841. CVSS Base score: 4.3 CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/177841](<https://exchange.xforce.ibmcloud.com/vulnerabilities/177841>) for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) ## Affected Products and Versions Affected Product(s)| Version(s) ---|--- Liberty for Java| 3.44 ## Remediation/Fixes To upgrade to Liberty for Java 3.45-20200601-1056 or higher, you must re-stage or re-push your application To find the current version of Liberty for Java in IBM Cloud being used, from the command-line Cloud Foundry client by running the following commands: cf ssh <appname> -c cat "staging_info.yml" Look for the following lines: {"detected_buildpack":"Liberty for Java(TM) (WAR, liberty-19.0.0_9, buildpack-v3.44-20200430-1451, ibmjdk-1.8.0_sr5fp41-20190919, env)","start_command":".liberty/initial_startup.rb"} To re-stage your application using the command-line Cloud Foundry client, use the following command: cf restage <appname> To re-push your application using the command-line Cloud Foundry client, use the following command: cf push <appname> ## Workarounds and Mitigations None ##


Affected Software


CPE Name Name Version
liberty for java 3.44

Related