5.9 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
This bulletin addresses several security vulnerabilities that are fixed in IBM Cognos Controller 10.4.1 IF2, 10.4.0 IF5, 10.3.1 IF12 and 10.3.0 FP1 IF13.
A vulnerability exists in IBM Cognos Controller that could allow an authenticated user to obtain sensitive information due to easy to guess session identifier names.
IBM Cognos Controller stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history.
IBM Cognos Controller consumes Faster XML Jackson. A vulnerability exists in Faster XML Jackson-Databind that could be exploitable by an attacker.
CVEID: CVE-2019-4411 DESCRIPTION: IBM Cognos Controller could allow an authenticated user to obtain sensitive information due to easy to guess session identifier names.
CVSS Base Score: 4.3
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/162658> for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)
CVEID: CVE-2019-4412 DESCRIPTION: IBM Cognos Controller stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history.
CVSS Base Score: 3.7
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/162659> for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)
CVEID: CVE-2019-12814 DESCRIPTION: FasterXML jackson-databind could allow a remote attacker to obtain sensitive information, caused by a polymorphic typing issue. By sending a specially-crafted JSON message, an attacker could exploit this vulnerability to read arbitrary local files on the server.
CVSS Base Score: 7.5
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/162875> for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
IBM Cognos Controller 10.4.1
IBM Cognos Controller 10.4.0
IBM Cognos Controller 10.3.1
IBM Cognos Controller 10.3.0
The recommended solution is to apply the applicable IBM Cognos Controller Interim Fix as soon as practical.
[Cognos Controller 10.4.0 IF5 and 10.4.1 IF2](<https://www.ibm.com/support/pages/node/1103427 >)
Cognos Controller 10.3.0 FP1 IF13 and 10.3.1 IF12
Please be advised , if you are a Cognos Controller 10.4.0 or 10.4.1 customer , the fixes for CVE-2019-4411 and CVE-2019-4412 are only available in 10.4.0 IF5 and 10.4.1 IF2. If you are a Cognos Controller 10.3.0 or 10.3.1 customer, all CVEs have been addressed in 10.3.0 FP1 IF13 and 10.3.1 IF12.
Cognos Controller Versions where each CVE has been addressed:
CVE | 10.3.0 FP1 IF13 | 10.3.1 IF12 | 10.4.0 FP1 IF4 | 10.4.0 FP1 IF5 | 10.4.1 IF1 | 10.4.1 IF2 |
---|---|---|---|---|---|---|
CVE-2019-4411 | Y | Y | N | Y | N | Y |
CVE-2019-4412 | Y | Y | N | Y | N | Y |
CVE-2019-12814 | Y | Y | Y | Y | Y | Y |
None
CPE | Name | Operator | Version |
---|---|---|---|
ibm cognos controller | eq | 10.4.1 | |
ibm cognos controller | eq | 10.4.0 | |
ibm cognos controller | eq | 10.3.1 | |
ibm cognos controller | eq | 10.3.0 |
5.9 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N