6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N
3.6 Low
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:H/Au:S/C:P/I:P/A:N
Spring Framework is vulnerable to a security issue affecting Rational Test Control Panel
CVEID:CVE-2020-5421
**DESCRIPTION:**VMware Tanzu Spring Framework could allow a remote attacker to bypass security restrictions, caused by improper input validation. By using a specially-crafted jsessionid path parameter, an attacker could exploit this vulnerability to bypass RFD Protection.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/188530 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Affected Product(s) | Version(s) |
---|---|
RTW/RTVS RTCP | 9.2 |
RTW/RTVS RTCP| 9.5
RTW/RTVS RTCP| 10.0
RTW/RTVS RTCP| 10.1
Remediation/Fixes:
1. Confirm the version of Rational Test Control Panel that you have installed. This can be discovered from IBM Installation Manager (click File -> View Installed Packages) or by clicking Help -> About in the Rational Test Control Panel web application UI.
2. On the IBM Fix Central website, locate either the Rational Test Workbench or Rational Test Virtualization Server products. For your version of Rational Test Control Panel, download the fix below. (If your version is not listed, please upgrade to the latest fixpack first).
3. Stop Rational Test Control Panel.
4. Go to the Rational Test Control Panel installation directory.
On Windows this is usually:
64 bit installation: C:\Program Files\IBM\RationalTestControlPanel\
32 bit installation: C:\Program Files (x86)\IBM\RationalTestControlPanel\
On AIX, Linux and Solaris this is usually:
/opt/IBM/RationalTestControlPanel/
5. Copy (do not move) the directory called “usr” into a safe backup location, in case you need to revert this fix.
6. Unzip the fix into the current directory (“RationalTestControlPanel”) choosing to replace/overwrite the following jar files:
usr/servers/defaultServer/apps/RTCP.war/WEB-INF/lib/spring-web-4.3.22.RELEASE.jar
usr/servers/defaultServer/apps/rm.war/WEB-INF/lib/spring-web-4.3.22.RELEASE.jar
7. Start Rational Test Control Panel.
None
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N
3.6 Low
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:H/Au:S/C:P/I:P/A:N