Lucene search

K
ibmIBM3F7E0ECB8BB9DB6D82159373BABCA8170464A2FA3C528B51B22EFC13E32CB485
HistoryDec 14, 2023 - 10:45 a.m.

Security Bulletin: IBM App Connect Enterprise Certified Container Dashboard operands that use S3 storage are vulnerable to security restrictions bypass due to [CVE-2023-46234]

2023-12-1410:45:03
www.ibm.com
4
ibm
app connect enterprise
certified container
dashboard
s3 storage
vulnerability
fix
cve-2023-46234
node.js
browserify-sign
patch
upgrade
continuous delivery
lts
upgrade process

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

6.4 Medium

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

24.0%

Summary

Node.js module browserify-sign is used by IBM App Connect Enterprise Certified Container Dashboards for accessing S3 storage. IBM App Connect Enterprise Certified Container Dashboard operands that access bar files in S3 storage are vulnerable to security restrictions bypass. This bulletin provides patch information to address the reported vulnerability in Node.js module browserify-sign. [CVE-2023-46234]

Vulnerability Details

CVEID:CVE-2023-46234
**DESCRIPTION:**browserify browserify-sign could allow a remote attacker to bypass security restrictions, caused by an upper bound check issue in the dsaVerify function. By sending a specially crafted request, an attacker could exploit this vulnerability to perform signature forgery attack.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/269796 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)

Affected Products and Versions

Affected Product(s) Version(s)
App Connect Enterprise Certified Container 4.x
App Connect Enterprise Certified Container 5.0-lts
App Connect Enterprise Certified Container 5.x
App Connect Enterprise Certified Container 6.x
App Connect Enterprise Certified Container 7.x
App Connect Enterprise Certified Container 8.x
App Connect Enterprise Certified Container 9.x
App Connect Enterprise Certified Container 10.x

Remediation/Fixes

IBM strongly suggests the following:
App Connect Enterprise Certified Container 4.1.0 to 10.1.1 (Continuous Delivery)

Upgrade to App Connect Enterprise Certified Container Operator version 11.0.0 or higher, and ensure that all Dashboard components are at 12.0.10.0-r2 or higher. Documentation on the upgrade process is available at <https://www.ibm.com/docs/en/app-connect/containers_cd?topic=releases-upgrading-operator&gt;

App Connect Enterprise Certified Container 5.0 LTS (Long Term Support)

Upgrade to App Connect Enterprise Certified Container Operator version 5.0.13 or higher, and ensure that all Dashboard components are at 12.0.10.0-r2-lts or higher. Documentation on the upgrade process is available at <https://www.ibm.com/docs/en/app-connect-contlts?topic=releases-upgrading-operator&gt;

Workarounds and Mitigations

None

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

6.4 Medium

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

24.0%

Related for 3F7E0ECB8BB9DB6D82159373BABCA8170464A2FA3C528B51B22EFC13E32CB485