Lucene search

K
ibmIBM405686F4C8A49B60914A46F1EBBAE542138B7013E6E33CF779C7B9ECE0C22201
HistorySep 04, 2023 - 6:54 a.m.

Security Bulletin: The IBM® Engineering Lifecycle Engineering product using WebSphere Application Server Liberty is vulnerable to denial of service (CVE-2023-38737)

2023-09-0406:54:25
www.ibm.com
24
ibm
engineering lifecycle
websphere application server liberty
denial of service
vulnerability
restfulws-3.0
restfulws-3.1
exploit
memory resources
affected versions
security bulletin

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

23.6%

Summary

IBM WebSphere Application Server Liberty is vulnerable to a denial of service with the restfulWS-3.0 or restfulWS-3.1 feature enabled. Following IBM® Engineering Lifecycle Engineering products are vulnerable to this attack, it has been addressed in this bulletin: IBM Engineering Test Management, IBM Engineering Workflow Management, IBM Engineering Requirements Management DOORS Next.

Vulnerability Details

Refer to the security bulletin(s) listed in the Remediation/Fixes section

Affected Products and Versions

Affected Product(s) Version(s)
IBM Engineering Workflow Management 7.0.1
IBM Engineering Requirements Management DOORS Next
IBM Engineering Test Management
IBM Engineering Workflow Management 7.0.2
IBM Engineering Test Management
IBM Engineering Requirements Management DOORS Next
IBM Engineering Workflow Management 7.0.3

Remediation/Fixes

By sending a specially-crafted request, a remote attacker could exploit this vulnerability to cause the server to consume memory resources and this could lead to a denial of service.

Features affected: restfulWS-3.0 and restfulWS-3.1

This affects WebSphere Application Server Liberty versions 22.0.0.13 - 23.0.0.7

If any of the mentioned affected product is deployed on one of the above versions, Please follow the instruction given in the following article.

Link: <https://www.ibm.com/support/pages/node/7027509&gt;

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmibm_engineering_lifecycle_management_baseMatch6.0.6
OR
ibmibm_engineering_lifecycle_management_baseMatch6.0.6.1
OR
ibmibm_engineering_lifecycle_management_baseMatch7.0
OR
ibmibm_engineering_lifecycle_management_baseMatch7.0.1
OR
ibmibm_engineering_lifecycle_management_baseMatch7.0.2

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

23.6%

Related for 405686F4C8A49B60914A46F1EBBAE542138B7013E6E33CF779C7B9ECE0C22201