Lucene search

K
ibmIBM25ACBC37BF847C07DB268F19D48DBF40D18FA806E20FFFCA0C1E2BFEA5CC5FA1
HistoryJan 20, 2021 - 2:02 p.m.

Security Bulletin: Rational Test Control Panel affected by Spring Framework vulnerability

2021-01-2014:02:08
www.ibm.com
7

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N

3.6 Low

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:S/C:P/I:P/A:N

Summary

Spring Framework is vulnerable to a security issue affecting Rational Test Control Panel

Vulnerability Details

CVEID:CVE-2020-5421
**DESCRIPTION:**VMware Tanzu Spring Framework could allow a remote attacker to bypass security restrictions, caused by improper input validation. By using a specially-crafted jsessionid path parameter, an attacker could exploit this vulnerability to bypass RFD Protection.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/188530 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)

Affected Products and Versions

Affected Product(s) Version(s)
RTW/RTVS RTCP 9.2

RTW/RTVS RTCP| 9.5
RTW/RTVS RTCP| 10.0
RTW/RTVS RTCP| 10.1

Remediation/Fixes

Remediation/Fixes:
1. Confirm the version of Rational Test Control Panel that you have installed. This can be discovered from IBM Installation Manager (click File -> View Installed Packages) or by clicking Help -> About in the Rational Test Control Panel web application UI.
2. On the IBM Fix Central website, locate either the Rational Test Workbench or Rational Test Virtualization Server products. For your version of Rational Test Control Panel, download the fix below. (If your version is not listed, please upgrade to the latest fixpack first).
3. Stop Rational Test Control Panel.
4. Go to the Rational Test Control Panel installation directory.
On Windows this is usually:
64 bit installation: C:\Program Files\IBM\RationalTestControlPanel\
32 bit installation: C:\Program Files (x86)\IBM\RationalTestControlPanel\
On AIX, Linux and Solaris this is usually:
/opt/IBM/RationalTestControlPanel/
5. Copy (do not move) the directory called “usr” into a safe backup location, in case you need to revert this fix.
6. Unzip the fix into the current directory (“RationalTestControlPanel”) choosing to replace/overwrite the following jar files:
usr/servers/defaultServer/apps/RTCP.war/WEB-INF/lib/spring-web-4.3.22.RELEASE.jar
usr/servers/defaultServer/apps/rm.war/WEB-INF/lib/spring-web-4.3.22.RELEASE.jar
7. Start Rational Test Control Panel.

Workarounds and Mitigations

None

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N

3.6 Low

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:S/C:P/I:P/A:N

Related for 25ACBC37BF847C07DB268F19D48DBF40D18FA806E20FFFCA0C1E2BFEA5CC5FA1