Lucene search

K
ibmIBM2B37BF6DE8EBDCC65AEE933BE7F6F1D7F1C37A62CD1ADE6877E92FD54D499C7A
HistoryMay 15, 2023 - 6:29 a.m.

Security Bulletin: Vulnerability in Spring Framework affects IBM Tivoli Application Dependency Discovery Manager (CVE-2023-20863).

2023-05-1506:29:38
www.ibm.com
14
spring framework
ibm tivoli application dependency discovery manager
vulnerability
cve-2023-20863
denial of service
cvss
upgrade
taddm 7.3.0.9
efixes
workarounds

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

0.003 Low

EPSS

Percentile

70.0%

Summary

Vulnerability in Spring Framework affects IBM Tivoli Application Dependency Discovery Manager (CVE-2023-20863). IBM has addressed the vulnerabilities.

Vulnerability Details

CVEID:CVE-2023-20863
**DESCRIPTION:**VMware Tanzu Spring Framework is vulnerable to a denial of service, caused by improper input validation. By sending a specially crafted SpEL expression, a remote attacker could exploit this vulnerability to cause a denial of service condition.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/252807 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Tivoli Application Dependency Discovery Manager 7.3.0.0 - 7.3.0.10

Remediation/Fixes

In order to fix these vulnerabilities, Spring is to be upgraded to 5.3.27 version. The efix to resolve these vulnerabilities can only be applied to TADDM version 7.3.0.9 or later versions as per below given detailed steps. For customer at older TADDM Fixpack level (i.e., 7.3.0.8 or older), they need to first upgrade their TADDM environment to TADDM 7.3.0.9 level and then follow the step given below.

Detailed steps:

For TADDM 7.3.0.9 & Above, check if there is any previously applied eFixes in their TADDM environment.

  1. If there is no prior efixes(ls -rlt etc/efix*) applied in their TADDM, then download the efix given in Table-1and apply the efix.
  2. If there are existing efixes on TADDM (ls -rlt etc/efix*), please contact IBM Support and open a case for a custom version of the eFix as the efix involves TADDM code changes. Include the current eFix level (ls -rlt etc/efix*), TADDM version and a link to this bulletin in the Support Case

For any other TADDM fixpack level (i.e., 7.3.0.8 or older), to apply this bulletin, upgrade to TADDM 7.3.0.9 and then follow procedure as mentioned above for TADDM 7.3.0.9 & above .

Table-1

Fix|

VRMF

| APAR|How to acquire fix
—|—|—|—
efix_spring5.3.27_FP9211123.zip|

7.3.0.9

| None| Download eFix
efix_spring5.3.27_FP10221123.zip|

7.3.0.10

| None| Download eFix

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmtivoli_application_dependency_discovery_managerMatch7.3.0.0
OR
ibmtivoli_application_dependency_discovery_managerMatch7.3.0.8

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

0.003 Low

EPSS

Percentile

70.0%