There is a vulnerability in SnakeYaml that could allow a remote authenticated attacker to execute arbitrary code on the system. The code is used by IBM Process Mining. This bulletin identifies the security fixes to apply to address the vulnerability.
CVEID:CVE-2022-1471
**DESCRIPTION:**SnakeYaml could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an unsafe deserialization in the Constructor class. By using a specially-crafted yaml content, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVSS Base score: 8.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/241118 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L)
Affected Product(s) | Version(s) |
---|---|
IBM Process Mining | 1.13.0,1.13.1,1.13.2 |
Remediation/Fixes guidance:
Product(s) | **Version(s) number and/or range ** | Remediation/Fix/Instructions |
---|---|---|
IBM Process Mining | 1.13.0,1.13.1,1.13.2 |
Upgrade to version 1.14.0.0
1.Login to PassPortAdvantage
2. Search for
M0BMPML Process Mining 1.14.0.0 Server Multiplatform Multilingual
3. Download package
4. Follow install instructions
5. Repeat for M0BMQML Process Mining 1.14.0.0 Client Windows Multilingual
| |
Workarounds/Mitigation guidance:
None known
CPE | Name | Operator | Version |
---|---|---|---|
ibm cloud pak for automation | eq | 1.13.0 | |
ibm cloud pak for automation | eq | 1.13.1 | |
ibm cloud pak for automation | eq | 1.13.2 |