Lucene search

K
ibmIBM31C3FF84CEE85E81C03623D0BF125B67A87C4707531C822713D480B8EF77F452
HistoryJun 25, 2024 - 3:49 p.m.

Security Bulletin: IBM Sterling B2B Integrator Standard Edition does not correctly restrict frame objects

2024-06-2515:49:04
www.ibm.com
14
ibm sterling b2b integrator
frame objects
ui layers
user confusion
vulnerability
fix
web server
dashboard
security bulletin

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

AI Score

6.6

Confidence

High

EPSS

0

Percentile

13.7%

Summary

IBM Sterling B2B Integrator Standard Edition does not restrict or incorrectly restricts frame objects or UI layers that belong to another application or domain, which can lead to user confusion about which interface the user is interacting with.

Vulnerability Details

CVEID:CVE-2023-42011
**DESCRIPTION:**IBM Sterling B2B Integrator Standard Edition does not restrict or incorrectly restricts frame objects or UI layers that belong to another application or domain, which can lead to user confusion about which interface the user is interacting with.
CVSS Base score: 4.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/265508 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Sterling B2B Integrator 6.2
IBM Sterling B2B Integrator 6.1

Remediation/Fixes

B2Bi has already has X-FRAME-OPTIONS: SAMEORIGIN response header, which means that the content in an iFrame needs to come from same host to which the http request is made. So the B2Bi page can’t be embedded in an iFrame in attacker’s web site unless the attacker has the access to the web server that hosts B2Bi, which means they would have to be an administrator. Please note that this fix is already part of the affected releases of B2Bi and no update or patch is required.

Workarounds and Mitigations

  • Provide careful separation of duties between Server administrator and B2Bi privileged users who have access to B2Bi’s dashboard.
  • No patch or update is required to B2Bi because the affected releases already contain the restricting header.

Affected configurations

Vulners
Node
ibmsterling_b2b_integratorMatch6.0.0.0
OR
ibmsterling_b2b_integratorMatch6.2.0.2
VendorProductVersionCPE
ibmsterling_b2b_integrator6.0.0.0cpe:2.3:a:ibm:sterling_b2b_integrator:6.0.0.0:*:*:*:*:*:*:*
ibmsterling_b2b_integrator6.2.0.2cpe:2.3:a:ibm:sterling_b2b_integrator:6.2.0.2:*:*:*:*:*:*:*

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

AI Score

6.6

Confidence

High

EPSS

0

Percentile

13.7%

Related for 31C3FF84CEE85E81C03623D0BF125B67A87C4707531C822713D480B8EF77F452