Lucene search

K
ibmIBM4E0EB20A45B24C3D5B4663BD2490E5989A4F8BBEF0F9B39565DACCD443AE90F3
HistoryMar 13, 2024 - 2:34 p.m.

Security Bulletin: IBM Datapower Operations Dashboard is vulnerable to execute arbitrary code on the system CVE-2023-46308

2024-03-1314:34:19
www.ibm.com
14
ibm
datapower operations dashboard
remote code execution
vulnerability
cve-2023-46308
plotly.js
web console
prototype pollution
denial of service
upgrade

7.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

38.8%

Summary

plotly.js is used by the IBM Datapower Operations Dashboard in their web console.

Vulnerability Details

CVEID:CVE-2023-46308
**DESCRIPTION:**Plotly plotly.js could allow a remote attacker to execute arbitrary code on the system, caused by a prototype pollution flaw in the plot API calls. By adding or modifying properties of Object.prototype using a proto or constructor payload, an attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.
CVSS Base score: 7.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/278685 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)

Affected Products and Versions

Affected Product(s) Version(s)
DataPower Operations Dashboard 1.0.20.0

Remediation/Fixes

IBM strongly recommends addressing the vulnerability now by upgrading to version 1.0.20.1

https://www.ibm.com/support/fixcentral/swg/selectFixes?fixids=DPOD-1.0.20.1&product=ibm%2FWebSphere%2FWebSphere%20DataPower%20SOA%20Appliances&source=dbluesearch&mhsrc=ibmsearch_a&mhq=dpod&function=fixId&parent=ibm/WebSphere

Workarounds and Mitigations

None

7.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

38.8%

Related for 4E0EB20A45B24C3D5B4663BD2490E5989A4F8BBEF0F9B39565DACCD443AE90F3